Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
noway-2D8EB.exe

Overview

General Information

Sample name:noway-2D8EB.exe
Analysis ID:1389215
MD5:67918c99e163f3296fc57af6152379c1
SHA1:6bdace312710123462aba13aa57ccee36ac29c58
SHA256:1702f75a3d9167602db376f9253141a1c9ea279502842424925f92078412ccf0
Tags:exe
Infos:

Detection

Dicrord Rat
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected Dicrord Rat
.NET source code contains potential unpacker
Contains functionality to disable the Task Manager (.Net Source)
Machine Learning detection for dropped file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • noway-2D8EB.exe (PID: 5832 cmdline: C:\Users\user\Desktop\noway-2D8EB.exe MD5: 67918C99E163F3296FC57AF6152379C1)
    • sussy.exe (PID: 7516 cmdline: "C:\Users\user\Desktop\sussy.exe" MD5: B2F30C9372186A8BBA11A3A41CCD9CAE)
      • WerFault.exe (PID: 7716 cmdline: C:\Windows\system32\WerFault.exe -u -p 7516 -s 2332 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\Desktop\sussy.exeJoeSecurity_DicrordRatYara detected Dicrord RatJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DicrordRatYara detected Dicrord RatJoe Security
      00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_DicrordRatYara detected Dicrord RatJoe Security
        Process Memory Space: noway-2D8EB.exe PID: 5832JoeSecurity_DicrordRatYara detected Dicrord RatJoe Security
          Process Memory Space: sussy.exe PID: 7516JoeSecurity_DicrordRatYara detected Dicrord RatJoe Security
            SourceRuleDescriptionAuthorStrings
            9.0.sussy.exe.2422d870000.0.unpackJoeSecurity_DicrordRatYara detected Dicrord RatJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dllAvira URL Cloud: Label: malware
              Source: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.dAvira URL Cloud: Label: malware
              Source: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dllAvira URL Cloud: Label: malware
              Source: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSteAvira URL Cloud: Label: malware
              Source: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20graAvira URL Cloud: Label: malware
              Source: noway-2D8EB.exeReversingLabs: Detection: 44%
              Source: Yara matchFile source: 9.0.sussy.exe.2422d870000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: noway-2D8EB.exe PID: 5832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: sussy.exe PID: 7516, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\Desktop\sussy.exe, type: DROPPED
              Source: C:\Users\user\Desktop\sussy.exeJoe Sandbox ML: detected
              Source: noway-2D8EB.exeJoe Sandbox ML: detected
              Source: noway-2D8EB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 162.159.136.234:443 -> 192.168.2.7:49699 version: TLS 1.2
              Source: noway-2D8EB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: noway-2D8EB.exe
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb) source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Users\user\Desktop\sussy.PDBbM source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: b77a5c561934e089\mscorlib.pdb source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Configuration.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\System.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Core.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbc*] source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbE+ source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Web.Extensions.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Web.Extensions.pdbSystem.Configuration.ni.dllY9 source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.pdbvN+ source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp, WER35BE.tmp.dmp.13.dr
              Source: Binary string: C:\Users\user\Desktop\sussy.PDB source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: pC:\Users\user\Desktop\sussy.PDB source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbS source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.pdb0 source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: sussy.PDB- source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Xml.pdbk& source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: indoC:\Windows\mscorlib.pdb source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb- source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb,M source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.ni.pdbRSDS source: WER35BE.tmp.dmp.13.dr
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BA7E7 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_003BA7E7
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CBB70 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_003CBB70
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003DADB8 FindFirstFileExA,0_2_003DADB8
              Source: global trafficHTTP traffic detected: GET /?v=9&encording=json HTTP/1.1Connection: Upgrade,Keep-AliveUpgrade: websocketSec-WebSocket-Key: D0YK8HmHP5rKTOPjzu7lbQ==Sec-WebSocket-Version: 13Host: gateway.discord.gg
              Source: Joe Sandbox ViewIP Address: 162.159.136.234 162.159.136.234
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /?v=9&encording=json HTTP/1.1Connection: Upgrade,Keep-AliveUpgrade: websocketSec-WebSocket-Key: D0YK8HmHP5rKTOPjzu7lbQ==Sec-WebSocket-Version: 13Host: gateway.discord.gg
              Source: unknownDNS traffic detected: queries for: gateway.discord.gg
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 08 Feb 2024 15:19:45 GMTContent-Length: 0Connection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2BUQo5rIaIubgmomkA7C3bM8tc32zzRG29cMO0DvA1Z3ncPtAHABGe8XFkLsrT7nJpItXDaSn3jHue1wwZs8T%2F7mxC6ZvYcDi24g2kBF%2BPTzRyiEby2ketsW830R9BjUWYJ61Sg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 8524da4c89bc53c1-ATL
              Source: sussy.exe, 00000009.00000002.1745496307.000002422F6F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gateway.discord.gg
              Source: sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: http://www.google.com/maps/place/
              Source: sussy.exe.0.drString found in binary or memory: https://discord.com/api/v9/channels/
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://discord.com/api/v9/guilds/
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://file.io/
              Source: sussy.exe, 00000009.00000002.1745496307.000002422F6D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg
              Source: sussy.exe, 00000009.00000002.1745496307.000002422F6D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg/?v=9&encording=json
              Source: sussy.exe, 00000009.00000002.1745496307.000002422F6D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg/?v=9&encording=jsonX
              Source: sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg:443/?v=9&encording=json
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://geolocation-db.com/json
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSte
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20gra
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dll
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dll
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.d
              Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
              Source: unknownHTTPS traffic detected: 162.159.136.234:443 -> 192.168.2.7:49699 version: TLS 1.2

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 9.0.sussy.exe.2422d870000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: noway-2D8EB.exe PID: 5832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: sussy.exe PID: 7516, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\Desktop\sussy.exe, type: DROPPED
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B71E6: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_003B71E6
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B87090_2_003B8709
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C68870_2_003C6887
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BC0170_2_003BC017
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D009A0_2_003D009A
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BE1470_2_003BE147
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D12180_2_003D1218
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B32060_2_003B3206
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C72FF0_2_003C72FF
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003DD35E0_2_003DD35E
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003E14640_2_003E1464
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BE57B0_2_003BE57B
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D05960_2_003D0596
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B276D0_2_003B276D
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D09AE0_2_003D09AE
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D4A0A0_2_003D4A0A
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C3A020_2_003C3A02
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BEB7B0_2_003BEB7B
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D4C390_2_003D4C39
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C3C7D0_2_003C3C7D
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BFC430_2_003BFC43
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C6CBC0_2_003C6CBC
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D0DE30_2_003D0DE3
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C5EB80_2_003C5EB8
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B5EBC0_2_003B5EBC
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003DCEB00_2_003DCEB0
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003C3FAE0_2_003C3FAE
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B3FFE0_2_003B3FFE
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BEFEF0_2_003BEFEF
              Source: C:\Users\user\Desktop\sussy.exeCode function: 9_2_00007FFAAC6912E09_2_00007FFAAC6912E0
              Source: C:\Users\user\Desktop\sussy.exeCode function: 9_2_00007FFAAC6912D19_2_00007FFAAC6912D1
              Source: C:\Users\user\Desktop\sussy.exeCode function: 9_2_00007FFAAC6913FB9_2_00007FFAAC6913FB
              Source: C:\Users\user\Desktop\sussy.exeCode function: 9_2_00007FFAAC6913D39_2_00007FFAAC6913D3
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: String function: 003CE630 appears 54 times
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: String function: 003CE554 appears 35 times
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: String function: 003CEFB0 appears 31 times
              Source: C:\Users\user\Desktop\sussy.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7516 -s 2332
              Source: sussy.exe.0.drStatic PE information: No import functions for PE file found
              Source: noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDiscord rat.exe8 vs noway-2D8EB.exe
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: dxgidebug.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: ndfapi.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: wdi.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: duser.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: atlthunk.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: websocket.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeSection loaded: gpapi.dllJump to behavior
              Source: noway-2D8EB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal80.troj.evad.winEXE@4/7@1/1
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003B6EA8 GetLastError,FormatMessageW,0_2_003B6EA8
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CA07C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_003CA07C
              Source: C:\Users\user\Desktop\noway-2D8EB.exeFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_5708906Jump to behavior
              Source: C:\Users\user\Desktop\sussy.exeMutant created: NULL
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7516
              Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8a458676-38dd-4574-bfc8-2640ae9f92ffJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCommand line argument: sfxname0_2_003CD891
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCommand line argument: sfxstime0_2_003CD891
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCommand line argument: STARTDLG0_2_003CD891
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCommand line argument: xj@0_2_003CD891
              Source: noway-2D8EB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\noway-2D8EB.exeFile read: C:\Windows\win.iniJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: noway-2D8EB.exeReversingLabs: Detection: 44%
              Source: C:\Users\user\Desktop\noway-2D8EB.exeFile read: C:\Users\user\Desktop\noway-2D8EB.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\noway-2D8EB.exe C:\Users\user\Desktop\noway-2D8EB.exe
              Source: C:\Users\user\Desktop\noway-2D8EB.exeProcess created: C:\Users\user\Desktop\sussy.exe "C:\Users\user\Desktop\sussy.exe"
              Source: C:\Users\user\Desktop\sussy.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7516 -s 2332
              Source: C:\Users\user\Desktop\noway-2D8EB.exeProcess created: C:\Users\user\Desktop\sussy.exe "C:\Users\user\Desktop\sussy.exe" Jump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\sussy.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: noway-2D8EB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: noway-2D8EB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: noway-2D8EB.exe
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb) source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Users\user\Desktop\sussy.PDBbM source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: b77a5c561934e089\mscorlib.pdb source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Configuration.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\System.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Core.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbc*] source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbE+ source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Web.Extensions.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Web.Extensions.pdbSystem.Configuration.ni.dllY9 source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.pdbvN+ source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp, WER35BE.tmp.dmp.13.dr
              Source: Binary string: C:\Users\user\Desktop\sussy.PDB source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: pC:\Users\user\Desktop\sussy.PDB source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: sussy.exe, 00000009.00000002.1748182123.00000242481F0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbS source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.pdb0 source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: sussy.PDB- source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: System.Xml.pdbk& source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: indoC:\Windows\mscorlib.pdb source: sussy.exe, 00000009.00000002.1744890869.000000AFC89F1000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb- source: sussy.exe, 00000009.00000002.1748182123.0000024248210000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdb source: WER35BE.tmp.dmp.13.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb,M source: sussy.exe, 00000009.00000002.1748182123.0000024248255000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.ni.pdbRSDS source: WER35BE.tmp.dmp.13.dr
              Source: noway-2D8EB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: noway-2D8EB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: noway-2D8EB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: noway-2D8EB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: noway-2D8EB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: sussy.exe.0.dr, Program.cs.Net Code: LoadDll System.Reflection.Assembly.Load(byte[])
              Source: sussy.exe.0.dr, Program.cs.Net Code: password
              Source: sussy.exe.0.dr, Program.cs.Net Code: webcampic
              Source: sussy.exe.0.dr, Program.cs.Net Code: select_cam
              Source: sussy.exe.0.dr, Program.cs.Net Code: get_cams
              Source: sussy.exe.0.dr, Program.cs.Net Code: get_tokens
              Source: sussy.exe.0.drStatic PE information: 0xD6D709DC [Mon Mar 20 18:56:28 2084 UTC]
              Source: C:\Users\user\Desktop\noway-2D8EB.exeFile created: C:\Users\user\Desktop\__tmp_rar_sfx_access_check_5708906Jump to behavior
              Source: noway-2D8EB.exeStatic PE information: section name: .didat
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CE554 push eax; ret 0_2_003CE572
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CEFF6 push ecx; ret 0_2_003CF009
              Source: C:\Users\user\Desktop\sussy.exeCode function: 9_2_00007FFAAC693F9D push ebx; retf 000Bh9_2_00007FFAAC693FCA
              Source: C:\Users\user\Desktop\sussy.exeCode function: 9_2_00007FFAAC693FFD push ebx; retf 000Bh9_2_00007FFAAC693FCA
              Source: C:\Users\user\Desktop\noway-2D8EB.exeFile created: C:\Users\user\Desktop\sussy.exeJump to dropped file
              Source: C:\Users\user\Desktop\sussy.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeMemory allocated: 2422DBB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeMemory allocated: 24247640000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\sussy.exe TID: 7588Thread sleep count: 274 > 30Jump to behavior
              Source: C:\Users\user\Desktop\sussy.exe TID: 7588Thread sleep count: 177 > 30Jump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BA7E7 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_003BA7E7
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CBB70 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_003CBB70
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003DADB8 FindFirstFileExA,0_2_003DADB8
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CE03A VirtualQuery,GetSystemInfo,0_2_003CE03A
              Source: Amcache.hve.13.drBinary or memory string: VMware
              Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.13.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.13.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.13.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.13.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: sussy.exe, 00000009.00000002.1745152149.000002422D9F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
              Source: Amcache.hve.13.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.13.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.13.drBinary or memory string: vmci.sys
              Source: noway-2D8EB.exe, 00000000.00000002.1301013340.0000000002A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.13.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.13.drBinary or memory string: VMware20,1
              Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.13.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.13.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.13.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.13.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
              Source: Amcache.hve.13.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\noway-2D8EB.exeAPI call chain: ExitProcess graph end nodegraph_0-23918
              Source: C:\Users\user\Desktop\sussy.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CF1B5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003CF1B5
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D780E mov eax, dword ptr fs:[00000030h]0_2_003D780E
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003DBAA0 GetProcessHeap,0_2_003DBAA0
              Source: C:\Users\user\Desktop\sussy.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CF1B5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003CF1B5
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CF303 SetUnhandledExceptionFilter,0_2_003CF303
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CF4CB SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003CF4CB
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003D898F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003D898F
              Source: C:\Users\user\Desktop\sussy.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeProcess created: C:\Users\user\Desktop\sussy.exe "C:\Users\user\Desktop\sussy.exe" Jump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CF00B cpuid 0_2_003CF00B
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_003CA8CC
              Source: C:\Users\user\Desktop\sussy.exeQueries volume information: C:\Users\user\Desktop\sussy.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\sussy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003CD891 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_003CD891
              Source: C:\Users\user\Desktop\noway-2D8EB.exeCode function: 0_2_003BAEE5 GetVersionExW,0_2_003BAEE5
              Source: C:\Users\user\Desktop\sussy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: sussy.exe.0.dr, Program.cs.Net Code: DisableTaskManager
              Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.13.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.13.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 9.0.sussy.exe.2422d870000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: noway-2D8EB.exe PID: 5832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: sussy.exe PID: 7516, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\Desktop\sussy.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 9.0.sussy.exe.2422d870000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: noway-2D8EB.exe PID: 5832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: sussy.exe PID: 7516, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\Desktop\sussy.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              11
              Process Injection
              1
              Masquerading
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              3
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Query Registry
              Remote Desktop ProtocolData from Removable Media3
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
              Disable or Modify Tools
              Security Account Manager41
              Security Software Discovery
              SMB/Windows Admin SharesData from Network Shared Drive3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDS3
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput Capture4
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets2
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Obfuscated Files or Information
              Cached Domain Credentials35
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Timestomp
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              DLL Side-Loading
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              noway-2D8EB.exe45%ReversingLabsByteCode-MSIL.Trojan.Zilla
              noway-2D8EB.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\Desktop\sussy.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://discord.com/api/v9/channels/0%Avira URL Cloudsafe
              https://geolocation-db.com/json0%Avira URL Cloudsafe
              https://discord.com/api/v9/guilds/0%Avira URL Cloudsafe
              https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dll100%Avira URL Cloudmalware
              https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.d100%Avira URL Cloudmalware
              https://gateway.discord.gg/?v=9&encording=jsonX0%Avira URL Cloudsafe
              https://gateway.discord.gg/?v=9&encording=json0%Avira URL Cloudsafe
              https://gateway.discord.gg:443/?v=9&encording=json0%Avira URL Cloudsafe
              https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dll100%Avira URL Cloudmalware
              https://gateway.discord.gg0%Avira URL Cloudsafe
              https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSte100%Avira URL Cloudmalware
              http://gateway.discord.gg0%Avira URL Cloudsafe
              https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20gra100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              gateway.discord.gg
              162.159.136.234
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://gateway.discord.gg/?v=9&encording=jsonfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://geolocation-db.com/jsonnoway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                • Avira URL Cloud: safe
                unknown
                https://file.io/noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                  high
                  https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordStenoway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dllnoway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.dnoway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://gateway.discord.gg:443/?v=9&encording=jsonsussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://upx.sf.netAmcache.hve.13.drfalse
                    high
                    http://gateway.discord.ggsussy.exe, 00000009.00000002.1745496307.000002422F6F5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://gateway.discord.ggsussy.exe, 00000009.00000002.1745496307.000002422F6D9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dllnoway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://discord.com/api/v9/channels/sussy.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://gateway.discord.gg/?v=9&encording=jsonXsussy.exe, 00000009.00000002.1745496307.000002422F6D9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://discord.com/api/v9/guilds/noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20granoway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000002.1745496307.000002422F641000.00000004.00000800.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://www.google.com/maps/place/noway-2D8EB.exe, 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, sussy.exe, 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, sussy.exe.0.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        162.159.136.234
                        gateway.discord.ggUnited States
                        13335CLOUDFLARENETUSfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1389215
                        Start date and time:2024-02-08 16:18:43 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 1s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:22
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:noway-2D8EB.exe
                        Detection:MAL
                        Classification:mal80.troj.evad.winEXE@4/7@1/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 125
                        • Number of non-executed functions: 92
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.42.73.29
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target sussy.exe, PID 7516 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        • VT rate limit hit for: noway-2D8EB.exe
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        162.159.136.234SecuriteInfo.com.Exploit.Shell.29354.24275.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Exploit.Shell.29354.24275.exeGet hashmaliciousUnknownBrowse
                            1EdVSOmvh0.exeGet hashmaliciousDicrord RatBrowse
                              YEM2yTzOK9.exeGet hashmaliciousDicrord RatBrowse
                                https://pub-6fbff04eeb6c444fa79c22c8c01d96e2.r2.dev/loginonlinemicrosoffice.htmlGet hashmaliciousUnknownBrowse
                                  http://binaecn.comGet hashmaliciousUnknownBrowse
                                    XQDo1PTnRJ.exeGet hashmaliciousUnknownBrowse
                                      downloader.exeGet hashmaliciousDiscord Token StealerBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        gateway.discord.ggaBtQ4Tt70g.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.133.234
                                        aBtQ4Tt70g.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.135.234
                                        SecuriteInfo.com.Python.Agent-LZ.20719.17498.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                        • 162.159.135.234
                                        tools.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.134.234
                                        tools.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.134.234
                                        iostream.exeGet hashmaliciousBinder HackTool, Blank Grabber, Dicrord Rat, QuasarBrowse
                                        • 162.159.135.234
                                        Free_Nitro.exeGet hashmaliciousPython Stealer, Blank Grabber, Discord Token StealerBrowse
                                        • 162.159.134.234
                                        spoofer.exeGet hashmaliciousBlank Grabber, Dicrord Rat, Umbral StealerBrowse
                                        • 162.159.133.234
                                        1EdVSOmvh0.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.136.234
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSINV-0484 #U00a323,950.00.htmlGet hashmaliciousUnknownBrowse
                                        • 172.64.207.38
                                        aBtQ4Tt70g.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.133.234
                                        cRcQFPRvB5.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.12.205
                                        OriginalMessage.txt.msgGet hashmaliciousUnknownBrowse
                                        • 104.18.7.145
                                        aBtQ4Tt70g.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.135.234
                                        a6dezbyIs4.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                        • 104.21.41.83
                                        iWqtW5RXqa.exeGet hashmaliciousFormBookBrowse
                                        • 104.21.50.164
                                        Order nr. 400289593_0.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 172.67.74.152
                                        0ckZJf9ir5.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.13.205
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eaBtQ4Tt70g.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.136.234
                                        cRcQFPRvB5.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 162.159.136.234
                                        aBtQ4Tt70g.exeGet hashmaliciousDicrord RatBrowse
                                        • 162.159.136.234
                                        Transfer-Factura-6556542248.263.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 162.159.136.234
                                        Order nr. 400289593_0.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 162.159.136.234
                                        0ckZJf9ir5.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 162.159.136.234
                                        BCP Council Team Kinetic.htmlGet hashmaliciousUnknownBrowse
                                        • 162.159.136.234
                                        http://uptick4567.lolGet hashmaliciousHTMLPhisherBrowse
                                        • 162.159.136.234
                                        N4PSobGhBi.exeGet hashmaliciousAgentTeslaBrowse
                                        • 162.159.136.234
                                        No context
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):1.1609155238214508
                                        Encrypted:false
                                        SSDEEP:192:Sq54z9P08rLV8aeQdl/N6fmzuiF8Z24lO8E:X54zG8rLV8aT/gfmzuiF8Y4lO8E
                                        MD5:F152BAA4E680457DFE8A11044A5C8043
                                        SHA1:826655E3A360539ACFAFD844B660FAEA4B1D2722
                                        SHA-256:8E2FE917BDBEBB067314C3CE51C53503BAA75F8F1DA3827C6C58904D84367AF3
                                        SHA-512:D17145FF0CAF9F49A39FA4B63CFBCF6DCCA154CAFE81D22322BDF24A6B7F1016267053B0DEBD9F988222ABD4533F9043BFDA048370591EC9769E63F3354D165B
                                        Malicious:false
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.1.8.7.9.1.8.5.1.8.3.0.3.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.1.8.7.9.1.8.6.1.6.7.4.0.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.f.7.a.9.a.e.2.-.e.5.4.e.-.4.b.5.0.-.b.4.9.3.-.8.a.0.7.e.7.6.8.6.2.d.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.2.e.5.6.4.e.0.-.c.7.c.c.-.4.b.4.b.-.b.e.8.2.-.0.3.3.4.7.e.e.a.f.4.2.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.u.s.s.y...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.D.i.s.c.o.r.d. .r.a.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.5.c.-.0.0.0.1.-.0.0.1.4.-.0.c.7.a.-.f.6.3.d.a.2.5.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.3.f.e.e.e.1.7.a.3.6.3.4.1.9.f.5.5.d.6.5.e.a.2.c.1.6.f.5.b.3.0.0.0.0.0.0.0.0.0.!.0.0.0.0.8.1.5.c.5.5.8.7.9.a.c.3.4.e.e.4.b.7.b.0.8.d.a.7.a.9.4.2.b.9.8.7.6.f.7.2.9.6.b.9.!.s.u.s.s.y...e.x.e.....T.a.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Mini DuMP crash report, 16 streams, Thu Feb 8 15:19:45 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):554149
                                        Entropy (8bit):2.9027338325632317
                                        Encrypted:false
                                        SSDEEP:3072:YvlianuRlcSIYqz/xGvGUPYG1CCqeC4iHO3+vOoVmfyBOXpIymdSZiytKrJ76D4n:SyFVk/xGvGUdqZ473QL76D
                                        MD5:B8D15514D5C3C10D6365BC2FC61C8457
                                        SHA1:2914EE66B261AD081F7F7AB195C77A64650DC78B
                                        SHA-256:FB34AB3948B9E7334ECC48C8465460AD057A8C9B15CAAFAE30F9C6841AA42989
                                        SHA-512:29F33FFD2FFAAD1AE648A7FD4BA996EA47A1B5B859E7A68E3EDB49C33BEEBC9035552339560DBEC341F802816BD08AD578967D67EBB8495718860CC58634DAE7
                                        Malicious:false
                                        Reputation:low
                                        Preview:MDMP..a..... ..........e....................................<....)..........H).......?..............l.......8...........T...........([..}...........T4..........@6..............................................................................eJ.......6......Lw......................T.......\......e.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):6750
                                        Entropy (8bit):3.7164972070113094
                                        Encrypted:false
                                        SSDEEP:96:RSIU6o7wVetbTk+YZSYTyizU+YgaM4U089b5S645DWffgTm:R6l7wVeJTk+YZSEDrpr089b5f45EfgTm
                                        MD5:2386614F7C4607599A3A82921A96DEF8
                                        SHA1:818C610C2BDA063F6C19B9BD9D003288008B0991
                                        SHA-256:0D20918100BF4298F938A79E69D944366E8C57B37FE00FB03F55CEE8AD8A56DF
                                        SHA-512:1B0D3E97673FCF48DA2F8F7FC64F7725BE9DE15776285966D64DFD812A24F04EB33FEDA2204F8F41D6BDCBEE5178015EF6C59776EEEDFF292E779B7797C229FD
                                        Malicious:false
                                        Reputation:low
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.1.6.<./.P.i.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4781
                                        Entropy (8bit):4.44974310926309
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zsqNJg771I9+xWpW8VYgYm8M4Jp4b6Fe1yq8vu4bV3MtIKsO9d:uIjfqnI71g7VcJ+JWlp365sO9d
                                        MD5:F4516723E670D9E5845F7547BE840A0F
                                        SHA1:24DAE139DC9F85633A827283F2852D199D6F66A9
                                        SHA-256:F65769DEE72CF8F5B9A485AFB47B7205FB3671EDB251D7728D52099155AFC671
                                        SHA-512:DCC2614419EFDC6C0037E9A34C8E6441B51E68ECE78978C3C942993355A51CE5C0AC893D832058801BACA25D4832310EC4AEC082FE92E414606AEC6420EEBD7B
                                        Malicious:false
                                        Reputation:low
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="184702" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Users\user\Desktop\noway-2D8EB.exe
                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 238x212, components 3
                                        Category:dropped
                                        Size (bytes):6162
                                        Entropy (8bit):7.927474314229622
                                        Encrypted:false
                                        SSDEEP:96:qVqJx1MpULnq2gjgL9+6GY3S37HhGg6p3q6gwp1H9MWP5410NmN6jFx3paF/9OrS:kqBYinQhGFhpPgC99v41JIhx3CRjH
                                        MD5:EA583528B6382489FADE47166E5F8986
                                        SHA1:7A77DCD27CD9A868087C761796C629A029E53441
                                        SHA-256:3DE0EF4A2F9C04483F5BE15F95D0837126A87CC2EAA3112940C07E02B09F9250
                                        SHA-512:40B5F2703EBBFB2D5EC9F91E058E8BD23958453B920702E937B5786BCCF306942B0B801E52BEF8D88FC94C8BCDE998D294259AD08E01A36959B5553994F92DAD
                                        Malicious:false
                                        Reputation:low
                                        Preview:......JFIF..................................................!.%..+...&8&+/1555.$;@;4?.451...........4'!!44444444444444444444444444444444444444444444411?4?..........."........................................:........................!..1A"Qaq.2....R.B..#3b..r.S..................................."......................!1..."AQ2.............?..SM......6..........2...`|.o$.yO.......:....=V?..!6.GQ$..$.Xz:.$...(.BHj..,...|..<v;.{QOS......{..h.X...g.I...y..T.{.0.D..@...R..Yu5.#{G./[.x.......6..........v..myn8.p{r6..J..z./[..(>..h.:.'.I.O/%>.'.....?..Ue=aJ.U........u'.!\y.....<r......d.......yv=%.<...90-}O@.1..a.....7&....dyM{E.T..2.@.......hpY..Je...R.....3..f7...<..p.?.{...H.%F.O9d.....S..a...T...~$..l.@MM<y..aMUwX?...[.y9.T.....G6%.A, ..,.5..$.qc.........*L.....c.j.:S....._."..~..;.[._.o..^mHr.2..eg\."...~N..y.(.....T...I.........sz..TW...\~.#.K?.....j...57oe..#YCV.A....XM^.t..x..S.q.....#.9R..jQ.Q:s..#.`.F.?..o.......~...Ul.";..9..E./^.A.K39.v...G...p.z.
                                        Process:C:\Users\user\Desktop\noway-2D8EB.exe
                                        File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):80384
                                        Entropy (8bit):5.482119607372954
                                        Encrypted:false
                                        SSDEEP:1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
                                        MD5:B2F30C9372186A8BBA11A3A41CCD9CAE
                                        SHA1:815C55879AC34EE4B7B08DA7A942B9876F7296B9
                                        SHA-256:48A06CB0A56C9E5CEFE26B27E90DD8F4956396F3B95C8504759C029D48CE966B
                                        SHA-512:E4906B1AE2322C8661D1722258F65A8F509FCCF4558D19D89FB74DAFF93D484B33DCD423A4B37479965ABA3A27BC241BE506CCAC9CCEA835EAE43B817D194FE1
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_DicrordRat, Description: Yara detected Dicrord Rat, Source: C:\Users\user\Desktop\sussy.exe, Author: Joe Security
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..2............... .....@..... ....................................`...@......@............... ...............................`............................................................................................... ..H............text...80... ...2.................. ..`.rsrc........`.......4..............@..@........................................H...........x.......".....................................................{....*"..}....*2.(....o....*J. . ..}.....(....*6.|.....("...*6.|.....("...*6.|.....("...*..(....*^.{....{.....{....o7...*6.|.....("...*6.|.....("...*2.( ...(....*F~&....( ...o...+*2~&....o...+*2~&....oM...*2(I....oJ...*.~_...r...p.oe...r...p(f...og...(h...(i...(f...og...ob...*.~u...r...po`...%(v.....R....ow...oc...*.~u...r...po`...%(v.....ow...oc...*6.|2....("...*6.|6....("...*6.|9....("...*6.|=....("...*6.|A..
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.416675374083694
                                        Encrypted:false
                                        SSDEEP:6144:acifpi6ceLPL9skLmb0miSWSPtaJG8nAgex285i2MMhA20X4WABlGuNU5+:3i58iSWIZBk2MM6AFBKo
                                        MD5:5FEE9AF27334384EB1C8AA39243EFCAF
                                        SHA1:9D3AF32C6DE38C9270945CD6E98FECE832773622
                                        SHA-256:A900267477F6944C8DFF5222C688C77D2BF0E704C1647D73539F005213DB7C3B
                                        SHA-512:6BF9992B1CDCECD70D6711738F910FEA6269EA8B7B1F36ACF8C2D5F3E9A0A7AFA18A3DC44DAB48105708FF0A5D8CE5F537DD52385ACE31E02DDD59C17C9A795E
                                        Malicious:false
                                        Reputation:low
                                        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...?.Z...............................................................................................................................................................................................................................................................................................................................................<..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):5.8934662794034995
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:noway-2D8EB.exe
                                        File size:521'538 bytes
                                        MD5:67918c99e163f3296fc57af6152379c1
                                        SHA1:6bdace312710123462aba13aa57ccee36ac29c58
                                        SHA256:1702f75a3d9167602db376f9253141a1c9ea279502842424925f92078412ccf0
                                        SHA512:e5e5e7eae1c4cd9badfc5e285024edde7fa7587719cbcdf9942cd9d6415a0f616610dcefcccc829de57372a17e87325976d223a829981175210212c78f9a1ecd
                                        SSDEEP:6144:a8JsLcpjzTDDmHayakLkrb4NSarQWa+JhHXronjrEKBjkf:fzxzTDWikLSb4NS7H+7HXrKjrFaf
                                        TLSH:FEB4E5DDEE52B8F0F026C9F034356939A8762C2319F8451E5E5AE70891B20D26DF2E5F
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...+...._......._..'...._f.'...._..'..
                                        Icon Hash:689ba1a7a3bb80a1
                                        Entrypoint:0x41eef0
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x60C329FF [Fri Jun 11 09:16:47 2021 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:1
                                        File Version Major:5
                                        File Version Minor:1
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:1
                                        Import Hash:fcf1390e9ce472c7270447fc5c61a0c1
                                        Instruction
                                        call 00007FE2C0800EA9h
                                        jmp 00007FE2C08008CDh
                                        cmp ecx, dword ptr [0043E668h]
                                        jne 00007FE2C0800A45h
                                        ret
                                        jmp 00007FE2C080102Eh
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        push dword ptr [ebp+08h]
                                        mov esi, ecx
                                        call 00007FE2C07F3847h
                                        mov dword ptr [esi], 00435580h
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        and dword ptr [ecx+04h], 00000000h
                                        mov eax, ecx
                                        and dword ptr [ecx+08h], 00000000h
                                        mov dword ptr [ecx+04h], 00435588h
                                        mov dword ptr [ecx], 00435580h
                                        ret
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        lea eax, dword ptr [ecx+04h]
                                        mov dword ptr [ecx], 00435568h
                                        push eax
                                        call 00007FE2C0803BCDh
                                        pop ecx
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        sub esp, 0Ch
                                        lea ecx, dword ptr [ebp-0Ch]
                                        call 00007FE2C07F37DEh
                                        push 0043B704h
                                        lea eax, dword ptr [ebp-0Ch]
                                        push eax
                                        call 00007FE2C0803390h
                                        int3
                                        push ebp
                                        mov ebp, esp
                                        sub esp, 0Ch
                                        lea ecx, dword ptr [ebp-0Ch]
                                        call 00007FE2C08009E4h
                                        push 0043B91Ch
                                        lea eax, dword ptr [ebp-0Ch]
                                        push eax
                                        call 00007FE2C0803373h
                                        int3
                                        jmp 00007FE2C0805343h
                                        jmp dword ptr [00433260h]
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        push 00422150h
                                        push dword ptr fs:[00000000h]
                                        Programming Language:
                                        • [ C ] VS2008 SP1 build 30729
                                        • [IMP] VS2008 SP1 build 30729
                                        • [C++] VS2015 UPD3.1 build 24215
                                        • [EXP] VS2015 UPD3.1 build 24215
                                        • [RES] VS2015 UPD3 build 24213
                                        • [LNK] VS2015 UPD3.1 build 24215
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8300x34.rdata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8640x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x37c8c.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x9b0000x227c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x313ba0x31400675b3d32e0449f24d266c11fd42c4e23False0.5840141180203046data6.709807872238317IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x330000xa6220xa800d1ae5a0175dfb925fc91111d5aee7a6cFalse0.45317150297619047data5.222677614328155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x3e0000x237280x1000201530c9e56f172adf2473053298d48fFalse0.36767578125data3.7088186669877685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .didat0x620000x18c0x200b7f0feda7ab6671cb8b44734d1fc4180False0.447265625data3.3554341882340144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x630000x37c8c0x37e00d2300d17f2d276c8672e4094ca9e7159False0.1419489303691275data3.797759168945555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x9b0000x227c0x2400c4082250c29091b2a6f872d68c8d91ffFalse0.7757161458333334data6.564176621980741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        PNG0x635240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                        PNG0x6406c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                        RT_ICON0x656180x3334cDevice independent bitmap graphic, 225 x 450 x 32, image size 2025000.09586154286259178
                                        RT_DIALOG0x989640x286dataEnglishUnited States0.5092879256965944
                                        RT_DIALOG0x98bec0x13adataEnglishUnited States0.60828025477707
                                        RT_DIALOG0x98d280xecdataEnglishUnited States0.6991525423728814
                                        RT_DIALOG0x98e140x12edataEnglishUnited States0.5927152317880795
                                        RT_DIALOG0x98f440x338dataEnglishUnited States0.45145631067961167
                                        RT_DIALOG0x9927c0x252dataEnglishUnited States0.5757575757575758
                                        RT_STRING0x994d00x1e2dataEnglishUnited States0.3900414937759336
                                        RT_STRING0x996b40x1ccdataEnglishUnited States0.4282608695652174
                                        RT_STRING0x998800x1b8dataEnglishUnited States0.45681818181818185
                                        RT_STRING0x99a380x146dataEnglishUnited States0.5153374233128835
                                        RT_STRING0x99b800x446dataEnglishUnited States0.340036563071298
                                        RT_STRING0x99fc80x166dataEnglishUnited States0.49162011173184356
                                        RT_STRING0x9a1300x152dataEnglishUnited States0.5059171597633136
                                        RT_STRING0x9a2840x10adataEnglishUnited States0.49624060150375937
                                        RT_STRING0x9a3900xbcdataEnglishUnited States0.6329787234042553
                                        RT_STRING0x9a44c0xd6dataEnglishUnited States0.5747663551401869
                                        RT_GROUP_ICON0x9a5240x14data1.2
                                        RT_MANIFEST0x9a5380x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                        DLLImport
                                        KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                                        gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 8, 2024 16:19:44.881042957 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:44.881093979 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:44.881272078 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:44.910157919 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:44.910172939 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.164350986 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.164444923 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:45.179785967 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:45.179805040 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.180794001 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.233896971 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:45.297564983 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:45.337903023 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.463705063 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.463848114 CET44349699162.159.136.234192.168.2.7
                                        Feb 8, 2024 16:19:45.463922024 CET49699443192.168.2.7162.159.136.234
                                        Feb 8, 2024 16:19:45.473413944 CET49699443192.168.2.7162.159.136.234
                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 8, 2024 16:19:44.743314981 CET5914153192.168.2.71.1.1.1
                                        Feb 8, 2024 16:19:44.860474110 CET53591411.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Feb 8, 2024 16:19:44.743314981 CET192.168.2.71.1.1.10x55f5Standard query (0)gateway.discord.ggA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Feb 8, 2024 16:19:44.860474110 CET1.1.1.1192.168.2.70x55f5No error (0)gateway.discord.gg162.159.136.234A (IP address)IN (0x0001)false
                                        Feb 8, 2024 16:19:44.860474110 CET1.1.1.1192.168.2.70x55f5No error (0)gateway.discord.gg162.159.134.234A (IP address)IN (0x0001)false
                                        Feb 8, 2024 16:19:44.860474110 CET1.1.1.1192.168.2.70x55f5No error (0)gateway.discord.gg162.159.135.234A (IP address)IN (0x0001)false
                                        Feb 8, 2024 16:19:44.860474110 CET1.1.1.1192.168.2.70x55f5No error (0)gateway.discord.gg162.159.130.234A (IP address)IN (0x0001)false
                                        Feb 8, 2024 16:19:44.860474110 CET1.1.1.1192.168.2.70x55f5No error (0)gateway.discord.gg162.159.133.234A (IP address)IN (0x0001)false
                                        • gateway.discord.gg
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749699162.159.136.2344437516C:\Users\user\Desktop\sussy.exe
                                        TimestampBytes transferredDirectionData
                                        2024-02-08 15:19:45 UTC187OUTGET /?v=9&encording=json HTTP/1.1
                                        Connection: Upgrade,Keep-Alive
                                        Upgrade: websocket
                                        Sec-WebSocket-Key: D0YK8HmHP5rKTOPjzu7lbQ==
                                        Sec-WebSocket-Version: 13
                                        Host: gateway.discord.gg
                                        2024-02-08 15:19:45 UTC614INHTTP/1.1 404 Not Found
                                        Date: Thu, 08 Feb 2024 15:19:45 GMT
                                        Content-Length: 0
                                        Connection: close
                                        CF-Cache-Status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2BUQo5rIaIubgmomkA7C3bM8tc32zzRG29cMO0DvA1Z3ncPtAHABGe8XFkLsrT7nJpItXDaSn3jHue1wwZs8T%2F7mxC6ZvYcDi24g2kBF%2BPTzRyiEby2ketsW830R9BjUWYJ61Sg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        X-Content-Type-Options: nosniff
                                        Server: cloudflare
                                        CF-RAY: 8524da4c89bc53c1-ATL


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:16:19:38
                                        Start date:08/02/2024
                                        Path:C:\Users\user\Desktop\noway-2D8EB.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\noway-2D8EB.exe
                                        Imagebase:0x3b0000
                                        File size:521'538 bytes
                                        MD5 hash:67918C99E163F3296FC57AF6152379C1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_DicrordRat, Description: Yara detected Dicrord Rat, Source: 00000000.00000003.1253793520.0000000002A60000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:9
                                        Start time:16:19:43
                                        Start date:08/02/2024
                                        Path:C:\Users\user\Desktop\sussy.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\sussy.exe"
                                        Imagebase:0x2422d870000
                                        File size:80'384 bytes
                                        MD5 hash:B2F30C9372186A8BBA11A3A41CCD9CAE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_DicrordRat, Description: Yara detected Dicrord Rat, Source: 00000009.00000000.1297486569.000002422D872000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_DicrordRat, Description: Yara detected Dicrord Rat, Source: C:\Users\user\Desktop\sussy.exe, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        Reputation:low
                                        Has exited:true

                                        Target ID:13
                                        Start time:16:19:45
                                        Start date:08/02/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 7516 -s 2332
                                        Imagebase:0x7ff7e4e90000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:9.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:10%
                                          Total number of Nodes:1552
                                          Total number of Limit Nodes:33
                                          execution_graph 25148 3d2637 48 API calls 23154 3cd830 23155 3cd83d 23154->23155 23162 3be0ac 23155->23162 23173 3be0da 23162->23173 23165 3b3f8f 23196 3b3f62 23165->23196 23168 3caf04 PeekMessageW 23169 3caf1f GetMessageW 23168->23169 23170 3caf58 23168->23170 23171 3caf44 TranslateMessage DispatchMessageW 23169->23171 23172 3caf35 IsDialogMessageW 23169->23172 23171->23170 23172->23170 23172->23171 23179 3bd54a 23173->23179 23176 3be0fd LoadStringW 23177 3be0d7 23176->23177 23178 3be114 LoadStringW 23176->23178 23177->23165 23178->23177 23184 3bd483 23179->23184 23181 3bd567 23183 3bd57c 23181->23183 23192 3bd588 26 API calls 23181->23192 23183->23176 23183->23177 23185 3bd49e 23184->23185 23191 3bd497 _strncpy 23184->23191 23187 3bd4c2 23185->23187 23193 3c18ae WideCharToMultiByte 23185->23193 23188 3bd4f3 23187->23188 23194 3be046 50 API calls __vsnprintf 23187->23194 23195 3d5bc9 26 API calls 3 library calls 23188->23195 23191->23181 23192->23183 23193->23187 23194->23188 23195->23191 23197 3b3f79 __vswprintf_c_l 23196->23197 23200 3d5a44 23197->23200 23203 3d3b07 23200->23203 23204 3d3b2f 23203->23204 23205 3d3b47 23203->23205 23227 3d8c7a 20 API calls __dosmaperr 23204->23227 23205->23204 23207 3d3b4f 23205->23207 23229 3d40a6 23207->23229 23209 3d3b34 23228 3d8b59 26 API calls ___std_exception_copy 23209->23228 23212 3d3b3f 23220 3ceefa 23212->23220 23215 3d3bd7 23238 3d4456 51 API calls 3 library calls 23215->23238 23216 3b3f83 SetDlgItemTextW 23216->23168 23219 3d3be2 23239 3d4129 20 API calls _free 23219->23239 23221 3cef05 IsProcessorFeaturePresent 23220->23221 23222 3cef03 23220->23222 23224 3cf507 23221->23224 23222->23216 23240 3cf4cb SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23224->23240 23226 3cf5ea 23226->23216 23227->23209 23228->23212 23230 3d3b5f 23229->23230 23231 3d40c3 23229->23231 23237 3d4071 20 API calls 2 library calls 23230->23237 23231->23230 23241 3d92b5 GetLastError 23231->23241 23233 3d40e4 23262 3d940a 38 API calls __cftof 23233->23262 23235 3d40fd 23263 3d9437 38 API calls __cftof 23235->23263 23237->23215 23238->23219 23239->23212 23240->23226 23242 3d92cb 23241->23242 23243 3d92d7 23241->23243 23264 3da92b 11 API calls 2 library calls 23242->23264 23265 3d88c9 20 API calls 3 library calls 23243->23265 23246 3d92d1 23246->23243 23248 3d9320 SetLastError 23246->23248 23247 3d92e3 23249 3d92eb 23247->23249 23272 3da981 11 API calls 2 library calls 23247->23272 23248->23233 23266 3d87fe 23249->23266 23251 3d9300 23251->23249 23253 3d9307 23251->23253 23273 3d911b 20 API calls pre_c_initialization 23253->23273 23254 3d92f1 23256 3d932c SetLastError 23254->23256 23274 3d8886 38 API calls _abort 23256->23274 23257 3d9312 23259 3d87fe _free 20 API calls 23257->23259 23261 3d9319 23259->23261 23261->23248 23261->23256 23262->23235 23263->23230 23264->23246 23265->23247 23267 3d8809 RtlFreeHeap 23266->23267 23268 3d8832 __dosmaperr 23266->23268 23267->23268 23269 3d881e 23267->23269 23268->23254 23275 3d8c7a 20 API calls __dosmaperr 23269->23275 23271 3d8824 GetLastError 23271->23268 23272->23251 23273->23257 23275->23271 25192 3d3730 RtlUnwind 25193 3cab2d 78 API calls 25149 3dac28 27 API calls 3 library calls 23329 3cdf24 23331 3cdef5 23329->23331 23332 3ce221 23331->23332 23360 3cdf2e 23332->23360 23334 3ce23b 23335 3ce2bc 23334->23335 23336 3ce298 23334->23336 23339 3ce334 LoadLibraryExA 23335->23339 23341 3ce395 23335->23341 23344 3ce3a7 23335->23344 23350 3ce463 23335->23350 23337 3ce19f DloadReleaseSectionWriteAccess 11 API calls 23336->23337 23338 3ce2a3 RaiseException 23337->23338 23355 3ce491 23338->23355 23339->23341 23342 3ce347 GetLastError 23339->23342 23340 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23343 3ce4a0 23340->23343 23341->23344 23345 3ce3a0 FreeLibrary 23341->23345 23346 3ce370 23342->23346 23353 3ce35a 23342->23353 23343->23331 23347 3ce405 GetProcAddress 23344->23347 23344->23350 23345->23344 23349 3ce19f DloadReleaseSectionWriteAccess 11 API calls 23346->23349 23348 3ce415 GetLastError 23347->23348 23347->23350 23351 3ce428 23348->23351 23354 3ce37b RaiseException 23349->23354 23371 3ce19f 23350->23371 23351->23350 23356 3ce19f DloadReleaseSectionWriteAccess 11 API calls 23351->23356 23353->23341 23353->23346 23354->23355 23355->23340 23357 3ce449 RaiseException 23356->23357 23358 3cdf2e ___delayLoadHelper2@8 11 API calls 23357->23358 23359 3ce460 23358->23359 23359->23350 23361 3cdf3a 23360->23361 23362 3cdf60 23360->23362 23379 3cdfdd 23361->23379 23362->23334 23365 3cdf5b 23389 3cdf61 23365->23389 23368 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23369 3ce21d 23368->23369 23369->23334 23370 3ce1ec 23370->23368 23372 3ce1b1 23371->23372 23373 3ce1d3 23371->23373 23374 3cdfdd DloadLock 8 API calls 23372->23374 23373->23355 23375 3ce1b6 23374->23375 23376 3ce1ce 23375->23376 23377 3ce12f DloadProtectSection 3 API calls 23375->23377 23398 3ce1d7 8 API calls 2 library calls 23376->23398 23377->23376 23380 3cdf61 DloadUnlock 3 API calls 23379->23380 23381 3cdff2 23380->23381 23382 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23381->23382 23383 3cdf3f 23382->23383 23383->23365 23384 3ce12f 23383->23384 23386 3ce144 DloadObtainSection 23384->23386 23385 3ce14a 23385->23365 23386->23385 23387 3ce17f VirtualProtect 23386->23387 23397 3ce03a VirtualQuery GetSystemInfo 23386->23397 23387->23385 23390 3cdf6e 23389->23390 23391 3cdf72 23389->23391 23390->23370 23392 3cdf7a GetModuleHandleW 23391->23392 23393 3cdf76 23391->23393 23394 3cdf90 GetProcAddress 23392->23394 23396 3cdf8c 23392->23396 23393->23370 23395 3cdfa0 GetProcAddress 23394->23395 23394->23396 23395->23396 23396->23370 23397->23387 23398->23373 25150 3cac20 100 API calls 25151 3c9a20 10 API calls 25194 3c8f20 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 25153 3b1025 29 API calls pre_c_initialization 25195 3b1f25 127 API calls __EH_prolog 25199 3e0310 IsProcessorFeaturePresent 25155 3cd60b DialogBoxParamW 25201 3cff00 51 API calls 2 library calls 25202 3bed73 FreeLibrary 24219 3cb170 24220 3cb17a __EH_prolog 24219->24220 24382 3b130b 24220->24382 24223 3cb85c 24448 3ccfee 24223->24448 24224 3cb1bc 24227 3cb1c9 24224->24227 24228 3cb232 24224->24228 24289 3cb1a8 24224->24289 24232 3cb1ce 24227->24232 24233 3cb205 24227->24233 24231 3cb2d1 GetDlgItemTextW 24228->24231 24237 3cb24c 24228->24237 24229 3cb888 24235 3cb891 SendDlgItemMessageW 24229->24235 24236 3cb8a2 GetDlgItem SendMessageW 24229->24236 24230 3cb87a SendMessageW 24230->24229 24231->24233 24234 3cb307 24231->24234 24242 3be0ac 53 API calls 24232->24242 24232->24289 24238 3cb226 EndDialog 24233->24238 24233->24289 24239 3cb31f GetDlgItem 24234->24239 24379 3cb310 24234->24379 24235->24236 24466 3ca004 GetCurrentDirectoryW 24236->24466 24241 3be0ac 53 API calls 24237->24241 24238->24289 24244 3cb334 SendMessageW SendMessageW 24239->24244 24245 3cb355 SetFocus 24239->24245 24246 3cb26e SetDlgItemTextW 24241->24246 24247 3cb1e8 24242->24247 24243 3cb8d2 GetDlgItem 24249 3cb8ef 24243->24249 24250 3cb8f5 SetWindowTextW 24243->24250 24244->24245 24251 3cb365 24245->24251 24262 3cb37d 24245->24262 24252 3cb27c 24246->24252 24488 3b1241 SHGetMalloc 24247->24488 24249->24250 24467 3ca558 GetClassNameW 24250->24467 24256 3be0ac 53 API calls 24251->24256 24260 3cb289 GetMessageW 24252->24260 24252->24289 24253 3cb1ef 24257 3cb1f3 SetDlgItemTextW 24253->24257 24253->24289 24254 3cb7fc 24258 3be0ac 53 API calls 24254->24258 24261 3cb36f 24256->24261 24257->24289 24263 3cb80c SetDlgItemTextW 24258->24263 24265 3cb2a0 IsDialogMessageW 24260->24265 24260->24289 24489 3cce1e 24261->24489 24270 3be0ac 53 API calls 24262->24270 24267 3cb820 24263->24267 24265->24252 24269 3cb2af TranslateMessage DispatchMessageW 24265->24269 24273 3be0ac 53 API calls 24267->24273 24269->24252 24272 3cb3b4 24270->24272 24271 3cb940 24275 3cb970 24271->24275 24280 3be0ac 53 API calls 24271->24280 24276 3b3f8f _swprintf 51 API calls 24272->24276 24277 3cb849 24273->24277 24274 3cc085 98 API calls 24274->24271 24288 3cc085 98 API calls 24275->24288 24309 3cba28 24275->24309 24281 3cb3c6 24276->24281 24282 3be0ac 53 API calls 24277->24282 24278 3cb376 24392 3ba1ef 24278->24392 24286 3cb953 SetDlgItemTextW 24280->24286 24287 3cce1e 16 API calls 24281->24287 24282->24289 24284 3cb410 24398 3ca5b3 SetCurrentDirectoryW 24284->24398 24285 3cb405 GetLastError 24285->24284 24294 3be0ac 53 API calls 24286->24294 24287->24278 24295 3cb98b 24288->24295 24290 3cbad8 24291 3cbaea 24290->24291 24292 3cbae1 EnableWindow 24290->24292 24296 3cbb07 24291->24296 24507 3b12c8 GetDlgItem EnableWindow 24291->24507 24292->24291 24298 3cb967 SetDlgItemTextW 24294->24298 24304 3cb99d 24295->24304 24318 3cb9c2 24295->24318 24303 3cbb2e 24296->24303 24311 3cbb26 SendMessageW 24296->24311 24297 3cb426 24301 3cb42f GetLastError 24297->24301 24302 3cb43d 24297->24302 24298->24275 24300 3cba1b 24306 3cc085 98 API calls 24300->24306 24301->24302 24315 3cb4c8 24302->24315 24316 3cb455 GetTickCount 24302->24316 24358 3cb4b8 24302->24358 24303->24289 24312 3be0ac 53 API calls 24303->24312 24505 3c9878 32 API calls 24304->24505 24305 3cbafd 24508 3b12c8 GetDlgItem EnableWindow 24305->24508 24306->24309 24308 3cb9b6 24308->24318 24309->24290 24317 3cbab6 24309->24317 24324 3be0ac 53 API calls 24309->24324 24311->24303 24313 3cbb47 SetDlgItemTextW 24312->24313 24313->24289 24314 3cb6fd 24407 3b12e6 GetDlgItem ShowWindow 24314->24407 24320 3cb698 24315->24320 24321 3cb4e0 GetModuleFileNameW 24315->24321 24322 3b3f8f _swprintf 51 API calls 24316->24322 24506 3c9878 32 API calls 24317->24506 24318->24300 24325 3cc085 98 API calls 24318->24325 24320->24233 24332 3be0ac 53 API calls 24320->24332 24499 3bee15 83 API calls 24321->24499 24333 3cb46e 24322->24333 24324->24309 24329 3cb9f0 24325->24329 24326 3cb70d 24408 3b12e6 GetDlgItem ShowWindow 24326->24408 24328 3cbad5 24328->24290 24329->24300 24334 3cb9f9 DialogBoxParamW 24329->24334 24331 3cb506 24336 3b3f8f _swprintf 51 API calls 24331->24336 24337 3cb6ac 24332->24337 24399 3b98be 24333->24399 24334->24233 24334->24300 24335 3cb717 24340 3be0ac 53 API calls 24335->24340 24341 3cb528 CreateFileMappingW 24336->24341 24338 3b3f8f _swprintf 51 API calls 24337->24338 24342 3cb6ca 24338->24342 24344 3cb721 SetDlgItemTextW 24340->24344 24345 3cb58a GetCommandLineW 24341->24345 24376 3cb607 __vswprintf_c_l 24341->24376 24357 3be0ac 53 API calls 24342->24357 24343 3cb494 24347 3cb4a6 24343->24347 24348 3cb49b GetLastError 24343->24348 24409 3b12e6 GetDlgItem ShowWindow 24344->24409 24346 3cb59b 24345->24346 24500 3cadbe SHGetMalloc 24346->24500 24353 3b97f0 81 API calls 24347->24353 24348->24347 24349 3cb612 ShellExecuteExW 24371 3cb62f 24349->24371 24351 3cb733 SetDlgItemTextW GetDlgItem 24354 3cb768 24351->24354 24355 3cb750 GetWindowLongW SetWindowLongW 24351->24355 24353->24358 24410 3cc085 24354->24410 24355->24354 24356 3cb5b7 24501 3cadbe SHGetMalloc 24356->24501 24357->24233 24358->24314 24358->24315 24362 3cb5c3 24502 3cadbe SHGetMalloc 24362->24502 24363 3cb672 24363->24320 24370 3cb688 UnmapViewOfFile CloseHandle 24363->24370 24364 3cc085 98 API calls 24366 3cb784 24364->24366 24436 3cd3b2 24366->24436 24367 3cb5cf 24503 3bef88 83 API calls ___scrt_get_show_window_mode 24367->24503 24370->24320 24371->24363 24374 3cb65e Sleep 24371->24374 24373 3cb5e6 MapViewOfFile 24373->24376 24374->24363 24374->24371 24375 3cc085 98 API calls 24380 3cb7aa 24375->24380 24376->24349 24377 3cb7d3 24504 3b12c8 GetDlgItem EnableWindow 24377->24504 24379->24233 24379->24254 24380->24377 24381 3cc085 98 API calls 24380->24381 24381->24377 24383 3b136d 24382->24383 24384 3b1314 24382->24384 24510 3bdd4c GetWindowLongW SetWindowLongW 24383->24510 24385 3b137a 24384->24385 24509 3bdd73 62 API calls 2 library calls 24384->24509 24385->24223 24385->24224 24385->24289 24388 3b1336 24388->24385 24389 3b1349 GetDlgItem 24388->24389 24389->24385 24390 3b1359 24389->24390 24390->24385 24391 3b135f SetWindowTextW 24390->24391 24391->24385 24393 3ba1f9 24392->24393 24394 3ba2b3 24393->24394 24395 3ba28a 24393->24395 24511 3ba3fa 24393->24511 24394->24284 24394->24285 24395->24394 24396 3ba3fa 9 API calls 24395->24396 24396->24394 24398->24297 24400 3b98c8 24399->24400 24401 3b9932 CreateFileW 24400->24401 24402 3b9926 24400->24402 24401->24402 24403 3b9984 24402->24403 24404 3bb85c 2 API calls 24402->24404 24403->24343 24405 3b996b 24404->24405 24405->24403 24406 3b996f CreateFileW 24405->24406 24406->24403 24407->24326 24408->24335 24409->24351 24411 3cc08f __EH_prolog 24410->24411 24412 3cb776 24411->24412 24532 3cacc6 ExpandEnvironmentStringsW 24411->24532 24412->24364 24416 3cc3ad SetWindowTextW 24422 3cc0c6 _wcsrchr 24416->24422 24418 3bbb55 CharUpperW 24418->24422 24420 3d38ae 22 API calls 24420->24422 24422->24412 24422->24416 24422->24418 24422->24420 24423 3cc19b SetFileAttributesW 24422->24423 24435 3cc1b5 ___scrt_get_show_window_mode 24422->24435 24533 3c1ac4 CompareStringW 24422->24533 24534 3ca004 GetCurrentDirectoryW 24422->24534 24536 3ba71d 7 API calls 24422->24536 24537 3ba6a6 FindClose 24422->24537 24538 3cae2a 76 API calls ___std_exception_copy 24422->24538 24539 3cacc6 ExpandEnvironmentStringsW 24422->24539 24424 3cc255 GetFileAttributesW 24423->24424 24423->24435 24424->24422 24427 3cc267 DeleteFileW 24424->24427 24427->24422 24429 3cc278 24427->24429 24428 3cc577 GetDlgItem SetWindowTextW SendMessageW 24428->24435 24430 3b3f8f _swprintf 51 API calls 24429->24430 24432 3cc298 GetFileAttributesW 24430->24432 24431 3cc5b7 SendMessageW 24431->24422 24432->24429 24433 3cc2ad MoveFileW 24432->24433 24433->24422 24434 3cc2c5 MoveFileExW 24433->24434 24434->24422 24435->24422 24435->24424 24435->24428 24435->24431 24535 3bb6e7 52 API calls 2 library calls 24435->24535 24437 3cd3bc __EH_prolog 24436->24437 24540 3c0188 24437->24540 24439 3cd3ed 24544 3b5bd9 24439->24544 24441 3cd40b 24548 3b7d8e 24441->24548 24445 3cd45e 24565 3b7e21 24445->24565 24447 3cb795 24447->24375 24449 3ccff8 24448->24449 24450 3c9f7a 4 API calls 24449->24450 24451 3ccffd 24450->24451 24452 3cd005 GetWindow 24451->24452 24453 3cb862 24451->24453 24452->24453 24454 3cd025 24452->24454 24453->24229 24453->24230 24454->24453 24455 3cd032 GetClassNameW 24454->24455 24457 3cd0ba GetWindow 24454->24457 24458 3cd056 GetWindowLongW 24454->24458 25050 3c1ac4 CompareStringW 24455->25050 24457->24453 24457->24454 24458->24457 24459 3cd066 SendMessageW 24458->24459 24459->24457 24460 3cd07c GetObjectW 24459->24460 25051 3c9fba GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24460->25051 24462 3cd093 25052 3c9f99 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24462->25052 25053 3ca1bd 8 API calls ___scrt_get_show_window_mode 24462->25053 24465 3cd0a4 SendMessageW DeleteObject 24465->24457 24466->24243 24468 3ca59e 24467->24468 24469 3ca579 24467->24469 24471 3ca5ac 24468->24471 24472 3ca5a3 SHAutoComplete 24468->24472 25054 3c1ac4 CompareStringW 24469->25054 24475 3caa53 24471->24475 24472->24471 24473 3ca58c 24473->24468 24474 3ca590 FindWindowExW 24473->24474 24474->24468 24476 3caa5d __EH_prolog 24475->24476 24477 3b13a2 85 API calls 24476->24477 24478 3caa7f 24477->24478 25055 3b1f6f 24478->25055 24481 3caaa8 24484 3b1971 127 API calls 24481->24484 24482 3caa99 24483 3b1653 86 API calls 24482->24483 24485 3caaa4 24483->24485 24487 3caaca __vswprintf_c_l ___std_exception_copy 24484->24487 24485->24271 24485->24274 24486 3b1653 86 API calls 24486->24485 24487->24486 24488->24253 24490 3caf04 5 API calls 24489->24490 24491 3cce2a GetDlgItem 24490->24491 24492 3cce4c 24491->24492 24493 3cce80 SendMessageW SendMessageW 24491->24493 24496 3cce57 ShowWindow SendMessageW SendMessageW 24492->24496 24494 3ccebc 24493->24494 24495 3ccedb SendMessageW SendMessageW SendMessageW 24493->24495 24494->24495 24497 3ccf0e SendMessageW 24495->24497 24498 3ccf31 SendMessageW 24495->24498 24496->24493 24497->24498 24498->24278 24499->24331 24500->24356 24501->24362 24502->24367 24503->24373 24504->24379 24505->24308 24506->24328 24507->24305 24508->24296 24509->24388 24510->24385 24512 3ba407 24511->24512 24513 3ba42b 24512->24513 24514 3ba41e CreateDirectoryW 24512->24514 24515 3ba373 4 API calls 24513->24515 24514->24513 24516 3ba45e 24514->24516 24518 3ba431 24515->24518 24520 3ba46d 24516->24520 24524 3ba637 24516->24524 24517 3ba471 GetLastError 24517->24520 24518->24517 24521 3bb85c 2 API calls 24518->24521 24520->24393 24522 3ba447 24521->24522 24522->24517 24523 3ba44b CreateDirectoryW 24522->24523 24523->24516 24523->24517 24525 3ce630 24524->24525 24526 3ba644 SetFileAttributesW 24525->24526 24527 3ba65a 24526->24527 24528 3ba687 24526->24528 24529 3bb85c 2 API calls 24527->24529 24528->24520 24530 3ba66e 24529->24530 24530->24528 24531 3ba672 SetFileAttributesW 24530->24531 24531->24528 24532->24422 24533->24422 24534->24422 24535->24435 24536->24422 24537->24422 24538->24422 24539->24422 24541 3c0195 24540->24541 24569 3b17a9 24541->24569 24543 3c01ad 24543->24439 24545 3c0188 24544->24545 24546 3b17a9 78 API calls 24545->24546 24547 3c01ad 24546->24547 24547->24441 24549 3b7d98 __EH_prolog 24548->24549 24586 3bca2b 24549->24586 24551 3b7db3 24552 3ce512 new 8 API calls 24551->24552 24553 3b7ddd 24552->24553 24592 3c464c 24553->24592 24556 3b7f05 24557 3b7f0f 24556->24557 24562 3b7f79 24557->24562 24621 3ba6b9 24557->24621 24559 3b802c 24559->24445 24560 3b7fea 24560->24559 24627 3b6d41 74 API calls 24560->24627 24562->24560 24564 3ba6b9 8 API calls 24562->24564 24599 3b850d 24562->24599 24564->24562 24566 3b7e2f 24565->24566 24568 3b7e36 24565->24568 24567 3c1def 86 API calls 24566->24567 24567->24568 24570 3b17bf 24569->24570 24581 3b181a __vswprintf_c_l 24569->24581 24571 3b17e8 24570->24571 24582 3b6e68 76 API calls __vswprintf_c_l 24570->24582 24572 3b1847 24571->24572 24578 3b1807 ___std_exception_copy 24571->24578 24574 3d38ae 22 API calls 24572->24574 24576 3b184e 24574->24576 24575 3b17de 24583 3b6edc 75 API calls 24575->24583 24576->24581 24585 3b6edc 75 API calls 24576->24585 24578->24581 24584 3b6edc 75 API calls 24578->24584 24581->24543 24582->24575 24583->24571 24584->24581 24585->24581 24587 3bca35 __EH_prolog 24586->24587 24588 3ce512 new 8 API calls 24587->24588 24590 3bca78 24588->24590 24589 3ce512 new 8 API calls 24591 3bca9c 24589->24591 24590->24589 24591->24551 24593 3c4656 __EH_prolog 24592->24593 24594 3ce512 new 8 API calls 24593->24594 24595 3c4672 24594->24595 24596 3b7e0c 24595->24596 24598 3c0995 80 API calls 24595->24598 24596->24556 24598->24596 24600 3b8517 __EH_prolog 24599->24600 24628 3b13a2 24600->24628 24602 3b8532 24636 3ba097 24602->24636 24608 3b8561 24761 3b1653 24608->24761 24609 3b85fc 24655 3b86a5 24609->24655 24612 3b865c 24662 3b1f20 24612->24662 24616 3b855d 24616->24608 24616->24609 24619 3ba6b9 8 API calls 24616->24619 24765 3bbcc8 CompareStringW 24616->24765 24617 3b8667 24617->24608 24666 3b3a31 24617->24666 24676 3b8709 24617->24676 24619->24616 24622 3ba6ce 24621->24622 24623 3ba6d2 24622->24623 25038 3ba7e7 24622->25038 24623->24557 24625 3ba6e2 24625->24623 24626 3ba6e7 FindClose 24625->24626 24626->24623 24627->24559 24629 3b13a7 __EH_prolog 24628->24629 24630 3bca2b 8 API calls 24629->24630 24631 3b13df 24630->24631 24632 3ce512 new 8 API calls 24631->24632 24635 3b1438 ___scrt_get_show_window_mode 24631->24635 24633 3b1425 24632->24633 24633->24635 24766 3bb26d 24633->24766 24635->24602 24637 3ba0ae 24636->24637 24638 3b8548 24637->24638 24782 3b6f43 78 API calls 24637->24782 24638->24608 24640 3b19c6 24638->24640 24641 3b19d0 __EH_prolog 24640->24641 24651 3b1a20 24641->24651 24653 3b1a05 24641->24653 24783 3b1380 24641->24783 24643 3b1b70 24786 3b6d41 74 API calls 24643->24786 24645 3b3a31 100 API calls 24649 3b1bd3 24645->24649 24646 3b1b80 24646->24645 24646->24653 24647 3b1c1f 24647->24653 24654 3b1c52 24647->24654 24787 3b6d41 74 API calls 24647->24787 24649->24647 24650 3b3a31 100 API calls 24649->24650 24650->24649 24651->24643 24651->24646 24651->24653 24652 3b3a31 100 API calls 24652->24654 24653->24616 24654->24652 24654->24653 24656 3b86b2 24655->24656 24805 3c0ef6 GetSystemTime SystemTimeToFileTime 24656->24805 24658 3b8616 24658->24612 24659 3c1671 24658->24659 24807 3cd7d7 24659->24807 24663 3b1f25 __EH_prolog 24662->24663 24664 3b1f59 24663->24664 24815 3b1971 24663->24815 24664->24617 24667 3b3a3d 24666->24667 24668 3b3a41 24666->24668 24667->24617 24669 3b3a6e 24668->24669 24670 3b3a7c 24668->24670 24671 3b3aae 24669->24671 24976 3b3206 88 API calls 3 library calls 24669->24976 24977 3b276d 100 API calls 3 library calls 24670->24977 24671->24617 24674 3b3a7a 24674->24671 24978 3b1fd3 74 API calls 24674->24978 24677 3b8713 __EH_prolog 24676->24677 24678 3b874c 24677->24678 24686 3b8750 24677->24686 25002 3c86fd 102 API calls 24677->25002 24679 3b8775 24678->24679 24682 3b8808 24678->24682 24678->24686 24680 3b8797 24679->24680 24679->24686 25003 3b7c35 151 API calls 24679->25003 24680->24686 25004 3c86fd 102 API calls 24680->25004 24682->24686 24979 3b5dba 24682->24979 24686->24617 24687 3b8893 24687->24686 24987 3b83f8 24687->24987 24690 3b8a03 24691 3ba6b9 8 API calls 24690->24691 24692 3b8a6e 24690->24692 24691->24692 24991 3b7e92 24692->24991 24694 3bcb95 83 API calls 24697 3b8ac9 _memcmp 24694->24697 24695 3b8bfe 24696 3b8cd1 24695->24696 24703 3b8c4d 24695->24703 24701 3b8d2c 24696->24701 24713 3b8cdc 24696->24713 24697->24686 24697->24694 24697->24695 24698 3b8bf7 24697->24698 25005 3b83c4 85 API calls 24697->25005 25006 3b6d72 74 API calls 24697->25006 25007 3b6d72 74 API calls 24698->25007 24711 3b8cbe 24701->24711 25010 3b826d 98 API calls 24701->25010 24702 3b8d2a 24706 3b97f0 81 API calls 24702->24706 24707 3ba373 4 API calls 24703->24707 24703->24711 24704 3b935c 24705 3b97f0 81 API calls 24704->24705 24705->24686 24706->24686 24710 3b8c85 24707->24710 24709 3b8d97 24709->24704 24712 3b9b29 GetFileType 24709->24712 24723 3b8e02 24709->24723 24710->24711 25008 3b9508 98 API calls 24710->25008 24711->24702 24711->24709 24715 3b8dda 24712->24715 24713->24702 25009 3b804c 102 API calls 24713->25009 24714 3bac78 8 API calls 24717 3b8e51 24714->24717 24715->24723 25011 3b6d72 74 API calls 24715->25011 24719 3bac78 8 API calls 24717->24719 24736 3b8e67 24719->24736 24721 3b8df0 25012 3b70d6 77 API calls 24721->25012 24723->24714 24724 3b8f2a 24725 3b908e 24724->24725 24726 3b8f85 24724->24726 24730 3b90a0 24725->24730 24731 3b90b4 24725->24731 24747 3b8fb5 24725->24747 24727 3b8ff7 24726->24727 24728 3b8f95 24726->24728 24729 3b83f8 CharUpperW 24727->24729 24732 3b8fdb 24728->24732 24739 3b8fa3 24728->24739 24733 3b9012 24729->24733 24734 3b9477 122 API calls 24730->24734 24735 3c2e9e 75 API calls 24731->24735 24732->24747 25015 3b79d6 112 API calls 24732->25015 24743 3b903b 24733->24743 24744 3b9045 24733->24744 24733->24747 24734->24747 24738 3b90cd 24735->24738 24736->24724 25013 3b9cc1 SetFilePointer GetLastError SetEndOfFile 24736->25013 24740 3c2b4d 122 API calls 24738->24740 25014 3b6d72 74 API calls 24739->25014 24740->24747 25016 3b775c 86 API calls 24743->25016 25017 3b93b5 94 API calls __EH_prolog 24744->25017 24750 3b91dc 24747->24750 25018 3b6d72 74 API calls 24747->25018 24749 3b92e7 24749->24704 24752 3ba637 4 API calls 24749->24752 24750->24704 24750->24749 24751 3b9295 24750->24751 25019 3ba05f SetEndOfFile 24750->25019 24997 3b9f02 24751->24997 24754 3b9342 24752->24754 24754->24704 25020 3b6d72 74 API calls 24754->25020 24756 3b92dc 24757 3b9870 77 API calls 24756->24757 24757->24749 24759 3b9352 25021 3b7002 76 API calls _wcschr 24759->25021 24762 3b1665 24761->24762 25037 3bcace 86 API calls 24762->25037 24765->24616 24767 3bb277 __EH_prolog 24766->24767 24772 3bed5b 83 API calls 24767->24772 24769 3bb289 24773 3bb385 24769->24773 24772->24769 24774 3bb397 ___scrt_get_show_window_mode 24773->24774 24777 3c0c23 24774->24777 24780 3c0be3 GetCurrentProcess GetProcessAffinityMask 24777->24780 24781 3bb2ff 24780->24781 24781->24635 24782->24638 24788 3b16f2 24783->24788 24785 3b139c 24785->24651 24786->24653 24787->24654 24789 3b1708 24788->24789 24800 3b1760 __vswprintf_c_l 24788->24800 24790 3b1731 24789->24790 24801 3b6e68 76 API calls __vswprintf_c_l 24789->24801 24792 3b174d ___std_exception_copy 24790->24792 24793 3b1787 24790->24793 24792->24800 24803 3b6edc 75 API calls 24792->24803 24795 3d38ae 22 API calls 24793->24795 24794 3b1727 24802 3b6edc 75 API calls 24794->24802 24797 3b178e 24795->24797 24797->24800 24804 3b6edc 75 API calls 24797->24804 24800->24785 24801->24794 24802->24790 24803->24800 24804->24800 24806 3c0f26 __vswprintf_c_l 24805->24806 24806->24658 24808 3cd7e4 24807->24808 24809 3be0ac 53 API calls 24808->24809 24810 3cd807 24809->24810 24811 3b3f8f _swprintf 51 API calls 24810->24811 24812 3cd819 24811->24812 24813 3cce1e 16 API calls 24812->24813 24814 3c168a 24813->24814 24814->24612 24816 3b1981 24815->24816 24818 3b197d 24815->24818 24819 3b18b6 24816->24819 24818->24664 24820 3b18c8 24819->24820 24821 3b1905 24819->24821 24822 3b3a31 100 API calls 24820->24822 24827 3b3e9d 24821->24827 24823 3b18e8 24822->24823 24823->24818 24831 3b3ea6 24827->24831 24828 3b3a31 100 API calls 24828->24831 24829 3b1926 24829->24823 24832 3b1e20 24829->24832 24831->24828 24831->24829 24844 3c0957 24831->24844 24833 3b1e2a __EH_prolog 24832->24833 24852 3b3ac2 24833->24852 24835 3b1e54 24836 3b16f2 78 API calls 24835->24836 24843 3b1edb 24835->24843 24837 3b1e6b 24836->24837 24880 3b1869 78 API calls 24837->24880 24839 3b1e83 24841 3b1e8f 24839->24841 24881 3c1692 MultiByteToWideChar 24839->24881 24882 3b1869 78 API calls 24841->24882 24843->24823 24845 3c095e 24844->24845 24846 3c0979 24845->24846 24850 3b6e63 RaiseException __CxxThrowException@8 24845->24850 24847 3c098a SetThreadExecutionState 24846->24847 24851 3b6e63 RaiseException __CxxThrowException@8 24846->24851 24847->24831 24850->24846 24851->24847 24853 3b3acc __EH_prolog 24852->24853 24854 3b3afe 24853->24854 24855 3b3ae2 24853->24855 24856 3b3d47 24854->24856 24860 3b3b2a 24854->24860 24911 3b6d41 74 API calls 24855->24911 24934 3b6d41 74 API calls 24856->24934 24859 3b3aed 24859->24835 24860->24859 24883 3c2e9e 24860->24883 24862 3b3b79 24864 3b3ba7 24862->24864 24865 3b3bab 24862->24865 24867 3b3b97 24862->24867 24863 3b3c36 24896 3bac78 24863->24896 24864->24865 24913 3b1fb9 78 API calls 24864->24913 24865->24863 24879 3b3ba2 24865->24879 24914 3bcb95 24865->24914 24912 3b6d41 74 API calls 24867->24912 24872 3b3c49 24873 3b3ccd 24872->24873 24874 3b3cc3 24872->24874 24920 3c2b4d 24873->24920 24900 3b9477 24874->24900 24877 3b3ccb 24877->24879 24929 3b6d72 74 API calls 24877->24929 24930 3c1def 24879->24930 24880->24839 24881->24841 24882->24843 24884 3c2ead 24883->24884 24886 3c2eb7 24883->24886 24935 3b6edc 75 API calls 24884->24935 24887 3c2efe ___std_exception_copy 24886->24887 24890 3c2ef9 Concurrency::cancel_current_task 24886->24890 24895 3c2f59 ___scrt_get_show_window_mode 24886->24895 24888 3c3005 Concurrency::cancel_current_task 24887->24888 24889 3c2f35 24887->24889 24887->24895 24938 3d18c8 RaiseException 24888->24938 24936 3c2dd7 75 API calls 4 library calls 24889->24936 24937 3d18c8 RaiseException 24890->24937 24894 3c301d 24895->24862 24897 3bac85 24896->24897 24899 3bac8f 24896->24899 24898 3ce512 new 8 API calls 24897->24898 24898->24899 24899->24872 24901 3b9481 __EH_prolog 24900->24901 24939 3b7eec 24901->24939 24904 3b1380 78 API calls 24905 3b9493 24904->24905 24942 3bcc70 24905->24942 24907 3b94ed 24907->24877 24909 3bcc70 117 API calls 24910 3b94a5 24909->24910 24910->24907 24910->24909 24951 3bce55 97 API calls __vswprintf_c_l 24910->24951 24911->24859 24912->24879 24913->24865 24915 3bcbc8 24914->24915 24916 3bcbb6 24914->24916 24953 3b61c9 83 API calls 24915->24953 24952 3b61c9 83 API calls 24916->24952 24919 3bcbc0 24919->24863 24921 3c2b7f 24920->24921 24922 3c2b56 24920->24922 24923 3c2b73 24921->24923 24968 3c5120 122 API calls 2 library calls 24921->24968 24922->24923 24924 3c2b75 24922->24924 24926 3c2b6b 24922->24926 24923->24877 24967 3c5e38 117 API calls 24924->24967 24954 3c6887 24926->24954 24929->24879 24931 3c1df9 24930->24931 24933 3c1e19 24931->24933 24969 3c0a36 24931->24969 24934->24859 24935->24886 24936->24895 24937->24888 24938->24894 24940 3baee5 GetVersionExW 24939->24940 24941 3b7ef1 24940->24941 24941->24904 24948 3bcc86 __vswprintf_c_l 24942->24948 24943 3bcdfb 24944 3bce23 24943->24944 24945 3bcc0f 6 API calls 24943->24945 24946 3c0957 SetThreadExecutionState RaiseException 24944->24946 24945->24944 24949 3bcdf2 24946->24949 24947 3c86fd 102 API calls 24947->24948 24948->24943 24948->24947 24948->24949 24950 3bad60 91 API calls 24948->24950 24949->24910 24950->24948 24951->24910 24952->24919 24953->24919 24955 3c30c9 75 API calls 24954->24955 24966 3c6898 ___BuildCatchObject __vswprintf_c_l 24955->24966 24956 3bcc70 117 API calls 24956->24966 24957 3c6c6a 24958 3c4df4 98 API calls 24957->24958 24959 3c6c7a __vswprintf_c_l 24958->24959 24959->24923 24960 3c0d11 81 API calls 24960->24966 24961 3c3a02 117 API calls 24961->24966 24962 3c6cbc 117 API calls 24962->24966 24963 3c0acc 88 API calls 24963->24966 24964 3c72ff 122 API calls 24964->24966 24965 3c3476 98 API calls 24965->24966 24966->24956 24966->24957 24966->24960 24966->24961 24966->24962 24966->24963 24966->24964 24966->24965 24967->24923 24968->24923 24970 3c0d11 81 API calls 24969->24970 24971 3c0a58 ReleaseSemaphore 24970->24971 24972 3c0a78 24971->24972 24973 3c0a96 DeleteCriticalSection CloseHandle CloseHandle 24971->24973 24974 3c0b29 79 API calls 24972->24974 24973->24933 24975 3c0a82 FindCloseChangeNotification 24974->24975 24975->24972 24975->24973 24976->24674 24977->24674 24978->24671 24980 3b5dca 24979->24980 25022 3b5ce7 24980->25022 24983 3b5dfd 24984 3b5e40 24983->24984 24986 3b5e35 24983->24986 25027 3baf55 CompareStringW CharUpperW CompareStringW 24983->25027 24984->24986 25028 3c0104 CompareStringW 24984->25028 24986->24687 24988 3b8417 24987->24988 25034 3c1ab5 CharUpperW 24988->25034 24990 3b84c1 24990->24690 24992 3b7ea1 24991->24992 24993 3b7ee1 24992->24993 25035 3b70b8 74 API calls 24992->25035 24993->24697 24995 3b7ed9 25036 3b6d41 74 API calls 24995->25036 24998 3b9f13 24997->24998 25000 3b9f22 24997->25000 24999 3b9f19 FlushFileBuffers 24998->24999 24998->25000 24999->25000 25001 3b9f9b SetFileTime 25000->25001 25001->24756 25002->24678 25003->24680 25004->24686 25005->24697 25006->24697 25007->24695 25008->24711 25009->24702 25010->24711 25011->24721 25012->24723 25013->24724 25014->24747 25015->24747 25016->24747 25017->24747 25018->24750 25019->24751 25020->24759 25021->24704 25029 3b5be4 25022->25029 25024 3b5d08 25024->24983 25026 3b5be4 3 API calls 25026->25024 25027->24983 25028->24986 25030 3b5bee 25029->25030 25031 3b5cd6 25030->25031 25033 3baf55 CompareStringW CharUpperW CompareStringW 25030->25033 25031->25024 25031->25026 25033->25030 25034->24990 25035->24995 25036->24993 25039 3ba7f1 25038->25039 25040 3ba884 FindNextFileW 25039->25040 25041 3ba814 FindFirstFileW 25039->25041 25042 3ba88f GetLastError 25040->25042 25043 3ba8a3 25040->25043 25044 3ba82b 25041->25044 25049 3ba868 25041->25049 25042->25043 25043->25049 25045 3bb85c 2 API calls 25044->25045 25046 3ba840 25045->25046 25047 3ba85d GetLastError 25046->25047 25048 3ba844 FindFirstFileW 25046->25048 25047->25049 25048->25047 25048->25049 25049->24625 25050->24454 25051->24462 25052->24462 25053->24465 25054->24473 25056 3ba097 78 API calls 25055->25056 25057 3b1f7b 25056->25057 25058 3b19c6 100 API calls 25057->25058 25061 3b1f98 25057->25061 25059 3b1f88 25058->25059 25059->25061 25062 3b6d41 74 API calls 25059->25062 25061->24481 25061->24482 25062->25061 25203 3ced70 27 API calls pre_c_initialization 25204 3cbb70 93 API calls _swprintf 25161 3dec70 51 API calls 25162 3d5a70 QueryPerformanceFrequency QueryPerformanceCounter 25205 3da170 31 API calls 2 library calls 25206 3d9f70 71 API calls _free 25163 3b1075 85 API calls pre_c_initialization 25207 3ce772 38 API calls 2 library calls 25209 3caf60 100 API calls 25074 3cdc54 25075 3cdb58 25074->25075 25076 3ce221 ___delayLoadHelper2@8 19 API calls 25075->25076 25076->25075 25211 3ccf50 70 API calls 25212 3d2150 6 API calls 4 library calls 25213 3db950 GetCommandLineA GetCommandLineW 25216 3cab52 GetDlgItem EnableWindow ShowWindow SendMessageW 25091 3cdb4e 19 API calls ___delayLoadHelper2@8 25166 3b9840 81 API calls 25219 3d8340 8 API calls ___vcrt_uninitialize 25170 3c5eb8 122 API calls __vswprintf_c_l 25171 3ceebb 28 API calls 2 library calls 23276 3cecb0 23277 3cecb8 pre_c_initialization 23276->23277 23294 3d85b2 23277->23294 23279 3cecc3 pre_c_initialization 23301 3ce8b3 23279->23301 23281 3ced4c 23312 3cf1b5 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23281->23312 23283 3cecd8 __RTC_Initialize 23283->23281 23306 3cea54 23283->23306 23284 3ced53 ___scrt_initialize_default_local_stdio_options 23286 3cecf1 pre_c_initialization 23286->23281 23287 3ced02 23286->23287 23309 3cf403 InitializeSListHead 23287->23309 23289 3ced07 pre_c_initialization 23310 3cf40f 30 API calls 2 library calls 23289->23310 23291 3ced2a pre_c_initialization 23311 3d8652 38 API calls 3 library calls 23291->23311 23293 3ced35 pre_c_initialization 23295 3d85e4 23294->23295 23296 3d85c1 23294->23296 23295->23279 23296->23295 23313 3d8c7a 20 API calls __dosmaperr 23296->23313 23298 3d85d4 23314 3d8b59 26 API calls ___std_exception_copy 23298->23314 23300 3d85df 23300->23279 23302 3ce8c1 23301->23302 23305 3ce8c6 ___scrt_initialize_onexit_tables ___scrt_release_startup_lock 23301->23305 23302->23305 23315 3cf1b5 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23302->23315 23304 3ce949 23305->23283 23316 3cea19 23306->23316 23309->23289 23310->23291 23311->23293 23312->23284 23313->23298 23314->23300 23315->23304 23317 3cea3d 23316->23317 23318 3cea36 23316->23318 23323 3d8279 29 API calls __onexit 23317->23323 23322 3d8209 29 API calls __onexit 23318->23322 23321 3cea3b 23321->23286 23322->23321 23323->23321 25221 3c9db0 GdipDisposeImage GdipFree pre_c_initialization 25222 3e19b0 CloseHandle 25223 3cc0d9 108 API calls 4 library calls 25174 3ceea7 20 API calls 23402 3b13a7 85 API calls 3 library calls 25176 3dbaa0 GetProcessHeap 25177 3d9ea0 21 API calls 2 library calls 23404 3cc69e 23405 3cc757 23404->23405 23412 3cc6bc _wcschr 23404->23412 23406 3cc775 23405->23406 23419 3cc0d9 _wcsrchr 23405->23419 23457 3cd0df 23405->23457 23409 3cd0df 18 API calls 23406->23409 23406->23419 23409->23419 23410 3ccd51 23412->23405 23413 3c1ac4 CompareStringW 23412->23413 23413->23412 23414 3cc3ad SetWindowTextW 23414->23419 23419->23410 23419->23414 23421 3cc19b SetFileAttributesW 23419->23421 23433 3cc1b5 ___scrt_get_show_window_mode 23419->23433 23434 3c1ac4 CompareStringW 23419->23434 23435 3ca004 GetCurrentDirectoryW 23419->23435 23436 3bbb55 23419->23436 23441 3ba71d 7 API calls 23419->23441 23442 3ba6a6 FindClose 23419->23442 23443 3cae2a 76 API calls ___std_exception_copy 23419->23443 23444 3d38ae 23419->23444 23480 3cacc6 ExpandEnvironmentStringsW 23419->23480 23422 3cc255 GetFileAttributesW 23421->23422 23421->23433 23422->23419 23425 3cc267 DeleteFileW 23422->23425 23425->23419 23427 3cc278 23425->23427 23426 3cc577 GetDlgItem SetWindowTextW SendMessageW 23426->23433 23428 3b3f8f _swprintf 51 API calls 23427->23428 23430 3cc298 GetFileAttributesW 23428->23430 23429 3cc5b7 SendMessageW 23429->23419 23430->23427 23431 3cc2ad MoveFileW 23430->23431 23431->23419 23432 3cc2c5 MoveFileExW 23431->23432 23432->23419 23433->23419 23433->23422 23433->23426 23433->23429 23440 3bb6e7 52 API calls 2 library calls 23433->23440 23434->23419 23435->23419 23437 3bbb62 23436->23437 23481 3bb9f6 23437->23481 23439 3bbb80 23439->23419 23440->23433 23441->23419 23442->23419 23443->23419 23445 3d8926 23444->23445 23446 3d893e 23445->23446 23447 3d8933 23445->23447 23449 3d8946 23446->23449 23455 3d894f pre_c_initialization 23446->23455 23489 3d8838 23447->23489 23450 3d87fe _free 20 API calls 23449->23450 23453 3d893b 23450->23453 23451 3d8979 RtlReAllocateHeap 23451->23453 23451->23455 23452 3d8954 23496 3d8c7a 20 API calls __dosmaperr 23452->23496 23453->23419 23455->23451 23455->23452 23497 3d749d 7 API calls 2 library calls 23455->23497 23459 3cd0e9 ___scrt_get_show_window_mode 23457->23459 23458 3cd347 23458->23406 23459->23458 23460 3cd1d8 23459->23460 23503 3c1ac4 CompareStringW 23459->23503 23500 3ba373 23460->23500 23464 3cd20c ShellExecuteExW 23464->23458 23471 3cd21f 23464->23471 23466 3cd204 23466->23464 23467 3cd258 23505 3cd5a3 6 API calls 23467->23505 23468 3cd2ae CloseHandle 23469 3cd2bc 23468->23469 23470 3cd2c7 23468->23470 23506 3c1ac4 CompareStringW 23469->23506 23470->23458 23476 3cd33e ShowWindow 23470->23476 23471->23467 23471->23468 23472 3cd24e ShowWindow 23471->23472 23472->23467 23475 3cd270 23475->23468 23477 3cd283 GetExitCodeProcess 23475->23477 23476->23458 23477->23468 23478 3cd296 23477->23478 23478->23468 23480->23419 23484 3bffe4 23481->23484 23485 3bba04 23484->23485 23486 3bfff4 23484->23486 23485->23439 23488 3c1ab5 CharUpperW 23486->23488 23488->23485 23490 3d8876 23489->23490 23494 3d8846 pre_c_initialization 23489->23494 23499 3d8c7a 20 API calls __dosmaperr 23490->23499 23491 3d8861 RtlAllocateHeap 23493 3d8874 23491->23493 23491->23494 23493->23453 23494->23490 23494->23491 23498 3d749d 7 API calls 2 library calls 23494->23498 23496->23453 23497->23455 23498->23494 23499->23493 23507 3ba387 23500->23507 23503->23460 23504 3bb429 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23504->23466 23505->23475 23506->23470 23515 3ce630 23507->23515 23510 3ba37c 23510->23464 23510->23504 23511 3ba3a5 23517 3bb85c 23511->23517 23513 3ba3b9 23513->23510 23514 3ba3bd GetFileAttributesW 23513->23514 23514->23510 23516 3ba394 GetFileAttributesW 23515->23516 23516->23510 23516->23511 23518 3bb869 23517->23518 23519 3bb9f6 CharUpperW 23518->23519 23526 3bb873 23518->23526 23520 3bb882 23519->23520 23527 3bba22 CharUpperW 23520->23527 23522 3bb891 23523 3bb90c GetCurrentDirectoryW 23522->23523 23524 3bb895 23522->23524 23523->23526 23525 3bb9f6 CharUpperW 23524->23525 23525->23526 23526->23513 23527->23522 25178 3b6090 83 API calls 25179 3dee91 21 API calls __vswprintf_c_l 23536 3d798e 23537 3d799d 23536->23537 23538 3d79b9 23536->23538 23537->23538 23540 3d79a3 23537->23540 23559 3db5a0 23538->23559 23563 3d8c7a 20 API calls __dosmaperr 23540->23563 23543 3d79a8 23564 3d8b59 26 API calls ___std_exception_copy 23543->23564 23544 3d79e4 23565 3d7ab2 38 API calls 23544->23565 23547 3d7a01 23566 3d7c27 20 API calls 2 library calls 23547->23566 23549 3d7a0e 23550 3d7a17 23549->23550 23551 3d7a23 23549->23551 23567 3d8c7a 20 API calls __dosmaperr 23550->23567 23568 3d7ab2 38 API calls 23551->23568 23554 3d7a1c 23555 3d87fe _free 20 API calls 23554->23555 23556 3d79b2 23555->23556 23557 3d7a39 23557->23554 23558 3d87fe _free 20 API calls 23557->23558 23558->23554 23560 3db5a9 23559->23560 23561 3d79c0 GetModuleFileNameA 23559->23561 23569 3db497 23560->23569 23561->23544 23563->23543 23564->23556 23565->23547 23566->23549 23567->23554 23568->23557 23570 3d92b5 pre_c_initialization 38 API calls 23569->23570 23571 3db4a4 23570->23571 23589 3db5be 23571->23589 23573 3db4ac 23598 3db22b 23573->23598 23576 3d8838 __vswprintf_c_l 21 API calls 23577 3db4d4 23576->23577 23588 3db506 23577->23588 23605 3db660 23577->23605 23580 3d87fe _free 20 API calls 23582 3db4c3 23580->23582 23581 3db501 23615 3d8c7a 20 API calls __dosmaperr 23581->23615 23582->23561 23584 3db54a 23584->23588 23616 3db101 26 API calls 23584->23616 23585 3db51e 23585->23584 23586 3d87fe _free 20 API calls 23585->23586 23586->23584 23588->23580 23590 3db5ca ___scrt_is_nonwritable_in_current_image 23589->23590 23591 3d92b5 pre_c_initialization 38 API calls 23590->23591 23593 3db5d4 23591->23593 23596 3db658 ___scrt_is_nonwritable_in_current_image 23593->23596 23597 3d87fe _free 20 API calls 23593->23597 23617 3d8886 38 API calls _abort 23593->23617 23618 3da701 EnterCriticalSection 23593->23618 23619 3db64f LeaveCriticalSection _abort 23593->23619 23596->23573 23597->23593 23599 3d40a6 __cftof 38 API calls 23598->23599 23600 3db23d 23599->23600 23601 3db24c GetOEMCP 23600->23601 23602 3db25e 23600->23602 23603 3db275 23601->23603 23602->23603 23604 3db263 GetACP 23602->23604 23603->23576 23603->23582 23604->23603 23606 3db22b 40 API calls 23605->23606 23607 3db67f 23606->23607 23610 3db6d0 IsValidCodePage 23607->23610 23612 3db686 23607->23612 23614 3db6f5 ___scrt_get_show_window_mode 23607->23614 23608 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23609 3db4f9 23608->23609 23609->23581 23609->23585 23611 3db6e2 GetCPInfo 23610->23611 23610->23612 23611->23612 23611->23614 23612->23608 23620 3db303 GetCPInfo 23614->23620 23615->23588 23616->23588 23618->23593 23619->23593 23621 3db3e7 23620->23621 23626 3db33d 23620->23626 23623 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23621->23623 23625 3db493 23623->23625 23625->23612 23630 3dc3f8 23626->23630 23629 3da585 __vswprintf_c_l 43 API calls 23629->23621 23631 3d40a6 __cftof 38 API calls 23630->23631 23632 3dc418 MultiByteToWideChar 23631->23632 23634 3dc456 23632->23634 23642 3dc4ee 23632->23642 23637 3dc477 __vsnwprintf_l ___scrt_get_show_window_mode 23634->23637 23638 3d8838 __vswprintf_c_l 21 API calls 23634->23638 23635 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23639 3db39e 23635->23639 23636 3dc4e8 23649 3da5d0 20 API calls _free 23636->23649 23637->23636 23641 3dc4bc MultiByteToWideChar 23637->23641 23638->23637 23644 3da585 23639->23644 23641->23636 23643 3dc4d8 GetStringTypeW 23641->23643 23642->23635 23643->23636 23645 3d40a6 __cftof 38 API calls 23644->23645 23646 3da598 23645->23646 23650 3da368 23646->23650 23649->23642 23651 3da383 __vswprintf_c_l 23650->23651 23652 3da3a9 MultiByteToWideChar 23651->23652 23653 3da55d 23652->23653 23654 3da3d3 23652->23654 23655 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23653->23655 23659 3d8838 __vswprintf_c_l 21 API calls 23654->23659 23661 3da3f4 __vsnwprintf_l 23654->23661 23656 3da570 23655->23656 23656->23629 23657 3da43d MultiByteToWideChar 23658 3da4a9 23657->23658 23660 3da456 23657->23660 23686 3da5d0 20 API calls _free 23658->23686 23659->23661 23677 3daa3c 23660->23677 23661->23657 23661->23658 23665 3da4b8 23667 3d8838 __vswprintf_c_l 21 API calls 23665->23667 23671 3da4d9 __vsnwprintf_l 23665->23671 23666 3da480 23666->23658 23669 3daa3c __vswprintf_c_l 11 API calls 23666->23669 23667->23671 23668 3da54e 23685 3da5d0 20 API calls _free 23668->23685 23669->23658 23671->23668 23672 3daa3c __vswprintf_c_l 11 API calls 23671->23672 23673 3da52d 23672->23673 23673->23668 23674 3da53c WideCharToMultiByte 23673->23674 23674->23668 23675 3da57c 23674->23675 23687 3da5d0 20 API calls _free 23675->23687 23688 3da768 23677->23688 23681 3daaac LCMapStringW 23682 3daa6c 23681->23682 23683 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23682->23683 23684 3da46d 23683->23684 23684->23658 23684->23665 23684->23666 23685->23658 23686->23653 23687->23658 23691 3da794 23688->23691 23692 3da798 23688->23692 23689 3da7b8 23689->23692 23693 3da7c4 GetProcAddress 23689->23693 23691->23689 23691->23692 23696 3da804 23691->23696 23692->23682 23695 3daac4 10 API calls 3 library calls 23692->23695 23694 3da7d4 __crt_fast_encode_pointer 23693->23694 23694->23692 23695->23681 23697 3da825 LoadLibraryExW 23696->23697 23700 3da81a 23696->23700 23698 3da85a 23697->23698 23699 3da842 GetLastError 23697->23699 23698->23700 23701 3da871 FreeLibrary 23698->23701 23699->23698 23702 3da84d LoadLibraryExW 23699->23702 23700->23691 23701->23700 23702->23698 25181 3d7c88 55 API calls _free 25183 3c8e80 GetClientRect 23707 3ced82 23708 3ced8e ___scrt_is_nonwritable_in_current_image 23707->23708 23733 3ce87a 23708->23733 23710 3ced95 23712 3cedbe 23710->23712 23813 3cf1b5 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23710->23813 23717 3cedfd ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23712->23717 23744 3d856d 23712->23744 23716 3ceddd ___scrt_is_nonwritable_in_current_image 23724 3cee5d 23717->23724 23814 3d7533 38 API calls 5 library calls 23717->23814 23752 3cf2d0 23724->23752 23728 3cee89 23730 3cee92 23728->23730 23815 3d791b 28 API calls _abort 23728->23815 23816 3ce9f1 13 API calls 2 library calls 23730->23816 23734 3ce883 23733->23734 23817 3cf00b IsProcessorFeaturePresent 23734->23817 23736 3ce88f 23818 3d22b6 23736->23818 23738 3ce894 23739 3ce898 23738->23739 23827 3d83c7 23738->23827 23739->23710 23742 3ce8af 23742->23710 23745 3d8584 23744->23745 23746 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23745->23746 23747 3cedd7 23746->23747 23747->23716 23748 3d8511 23747->23748 23751 3d8540 23748->23751 23749 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23750 3d8569 23749->23750 23750->23717 23751->23749 23877 3cf5f0 23752->23877 23755 3cee63 23756 3d84be 23755->23756 23757 3db5a0 51 API calls 23756->23757 23759 3d84c7 23757->23759 23758 3cee6c 23761 3cd891 23758->23761 23759->23758 23879 3db92b 38 API calls 23759->23879 23880 3c03aa 23761->23880 23765 3cd8b0 23929 3ca5c6 23765->23929 23767 3cd8b9 23933 3c16cb GetCPInfo 23767->23933 23769 3cd8c3 ___scrt_get_show_window_mode 23770 3cd8d6 GetCommandLineW 23769->23770 23771 3cd8e5 23770->23771 23772 3cd963 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23770->23772 23936 3cbf14 23771->23936 23773 3b3f8f _swprintf 51 API calls 23772->23773 23775 3cd9ca SetEnvironmentVariableW GetModuleHandleW LoadIconW 23773->23775 23947 3cb07d LoadBitmapW 23775->23947 23777 3cd95d 23941 3cd544 23777->23941 23778 3cd8f3 OpenFileMappingW 23780 3cd90c MapViewOfFile 23778->23780 23781 3cd953 CloseHandle 23778->23781 23785 3cd91d __vswprintf_c_l 23780->23785 23786 3cd94a UnmapViewOfFile 23780->23786 23781->23772 23790 3cd544 2 API calls 23785->23790 23786->23781 23792 3cd939 23790->23792 23791 3c8a75 8 API calls 23793 3cda27 DialogBoxParamW 23791->23793 23792->23786 23794 3cda61 23793->23794 23795 3cda7a 23794->23795 23796 3cda73 Sleep 23794->23796 23798 3cda88 23795->23798 23977 3ca7d4 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 23795->23977 23796->23795 23799 3cdaa7 DeleteObject 23798->23799 23800 3cdabc DeleteObject 23799->23800 23801 3cdac3 23799->23801 23800->23801 23802 3cdaf4 23801->23802 23803 3cdb06 23801->23803 23978 3cd5a3 6 API calls 23802->23978 23974 3ca62e 23803->23974 23806 3cdafa CloseHandle 23806->23803 23807 3cdb40 23808 3d784f GetModuleHandleW 23807->23808 23809 3cee7f 23808->23809 23809->23728 23810 3d7978 23809->23810 24160 3d76f5 23810->24160 23813->23710 23814->23724 23815->23730 23816->23716 23817->23736 23819 3d22bb ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23818->23819 23831 3d33be 23819->23831 23822 3d22c9 23822->23738 23824 3d22d1 23825 3d22dc 23824->23825 23845 3d33fa DeleteCriticalSection 23824->23845 23825->23738 23873 3dbaca 23827->23873 23830 3d22df 8 API calls 3 library calls 23830->23739 23832 3d33c7 23831->23832 23834 3d33f0 23832->23834 23836 3d22c5 23832->23836 23846 3d3652 23832->23846 23851 3d33fa DeleteCriticalSection 23834->23851 23836->23822 23837 3d23fc 23836->23837 23866 3d3567 23837->23866 23839 3d2406 23844 3d2411 23839->23844 23871 3d3615 6 API calls try_get_function 23839->23871 23841 3d241f 23842 3d242c 23841->23842 23872 3d242f 6 API calls ___vcrt_FlsFree 23841->23872 23842->23824 23844->23824 23845->23822 23852 3d3446 23846->23852 23849 3d3689 InitializeCriticalSectionAndSpinCount 23850 3d3675 23849->23850 23850->23832 23851->23836 23853 3d347a 23852->23853 23855 3d3476 23852->23855 23853->23849 23853->23850 23855->23853 23857 3d349a 23855->23857 23859 3d34e6 23855->23859 23856 3d34a6 GetProcAddress 23858 3d34b6 __crt_fast_encode_pointer 23856->23858 23857->23853 23857->23856 23858->23853 23860 3d350e LoadLibraryExW 23859->23860 23861 3d3503 23859->23861 23862 3d352a GetLastError 23860->23862 23865 3d3542 23860->23865 23861->23855 23864 3d3535 LoadLibraryExW 23862->23864 23862->23865 23863 3d3559 FreeLibrary 23863->23861 23864->23865 23865->23861 23865->23863 23867 3d3446 try_get_function 5 API calls 23866->23867 23868 3d3581 23867->23868 23869 3d3599 TlsAlloc 23868->23869 23870 3d358a 23868->23870 23870->23839 23871->23841 23872->23844 23876 3dbae3 23873->23876 23874 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23875 3ce8a1 23874->23875 23875->23742 23875->23830 23876->23874 23878 3cf2e3 GetStartupInfoW 23877->23878 23878->23755 23879->23759 23881 3ce630 23880->23881 23882 3c03b4 GetModuleHandleW 23881->23882 23883 3c042f 23882->23883 23884 3c03cb GetProcAddress 23882->23884 23887 3c075f GetModuleFileNameW 23883->23887 23989 3d73cd 42 API calls __vsnwprintf_l 23883->23989 23885 3c03fc GetProcAddress 23884->23885 23886 3c03e4 23884->23886 23885->23883 23889 3c040e 23885->23889 23886->23885 23900 3c077e 23887->23900 23889->23883 23890 3c0699 23890->23887 23891 3c06a4 GetModuleFileNameW CreateFileW 23890->23891 23892 3c06d7 SetFilePointer 23891->23892 23893 3c0753 CloseHandle 23891->23893 23892->23893 23894 3c06e7 ReadFile 23892->23894 23893->23887 23894->23893 23897 3c0706 23894->23897 23897->23893 23899 3c0360 3 API calls 23897->23899 23898 3c07ad CompareStringW 23898->23900 23899->23897 23900->23898 23901 3c07e3 GetFileAttributesW 23900->23901 23902 3c07fb 23900->23902 23979 3baee5 23900->23979 23982 3c0360 23900->23982 23901->23900 23901->23902 23903 3c083b 23902->23903 23906 3c0805 23902->23906 23904 3c094a 23903->23904 23908 3baee5 GetVersionExW 23903->23908 23928 3ca004 GetCurrentDirectoryW 23904->23928 23905 3c081d GetFileAttributesW 23905->23906 23907 3c0835 23905->23907 23906->23905 23906->23907 23907->23903 23909 3c0855 23908->23909 23910 3c085c 23909->23910 23911 3c08c2 23909->23911 23912 3c0360 3 API calls 23910->23912 23913 3b3f8f _swprintf 51 API calls 23911->23913 23914 3c0866 23912->23914 23915 3c08ea AllocConsole 23913->23915 23916 3c0360 3 API calls 23914->23916 23917 3c08f7 GetCurrentProcessId AttachConsole 23915->23917 23918 3c0942 ExitProcess 23915->23918 23920 3c0870 23916->23920 23990 3d3883 23917->23990 23922 3be0ac 53 API calls 23920->23922 23921 3c0918 GetStdHandle WriteConsoleW Sleep FreeConsole 23921->23918 23923 3c088b 23922->23923 23924 3b3f8f _swprintf 51 API calls 23923->23924 23925 3c089e 23924->23925 23926 3be0ac 53 API calls 23925->23926 23927 3c08ad 23926->23927 23927->23918 23928->23765 23930 3c0360 3 API calls 23929->23930 23931 3ca5da OleInitialize 23930->23931 23932 3ca5fd GdiplusStartup SHGetMalloc 23931->23932 23932->23767 23934 3c16ef IsDBCSLeadByte 23933->23934 23934->23934 23935 3c1707 23934->23935 23935->23769 23938 3cbf1e 23936->23938 23937 3cc034 23937->23777 23937->23778 23938->23937 23939 3c1ab5 CharUpperW 23938->23939 23992 3bef88 83 API calls ___scrt_get_show_window_mode 23938->23992 23939->23938 23942 3ce630 23941->23942 23943 3cd551 SetEnvironmentVariableW 23942->23943 23944 3cd574 23943->23944 23945 3cd59c 23944->23945 23946 3cd590 SetEnvironmentVariableW 23944->23946 23945->23772 23946->23945 23948 3cb09e 23947->23948 23949 3cb0a5 23947->23949 23998 3ca07c FindResourceW 23948->23998 23951 3cb0ba 23949->23951 23952 3cb0ab GetObjectW 23949->23952 23993 3c9f7a 23951->23993 23952->23951 23954 3cb110 23966 3bd5dc 23954->23966 23956 3cb0ec 24012 3c9fba GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23956->24012 23958 3ca07c 12 API calls 23960 3cb0dd 23958->23960 23959 3cb0f4 24013 3c9f99 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23959->24013 23960->23956 23962 3cb0e3 DeleteObject 23960->23962 23962->23956 23963 3cb0fd 24014 3ca1bd 8 API calls ___scrt_get_show_window_mode 23963->24014 23965 3cb104 DeleteObject 23965->23954 24025 3bd601 23966->24025 23968 3bd5e8 24065 3bdd29 GetModuleHandleW FindResourceW 23968->24065 23971 3c8a75 24151 3ce512 23971->24151 23975 3ca65d GdiplusShutdown OleUninitialize 23974->23975 23975->23807 23977->23798 23978->23806 23980 3baef9 GetVersionExW 23979->23980 23981 3baf35 23979->23981 23980->23981 23981->23900 23983 3ce630 23982->23983 23984 3c036d GetSystemDirectoryW 23983->23984 23985 3c0385 23984->23985 23986 3c03a3 23984->23986 23987 3bbb55 CharUpperW 23985->23987 23986->23900 23988 3c0396 LoadLibraryW 23987->23988 23988->23986 23989->23890 23991 3d388b 23990->23991 23991->23921 23991->23991 23992->23938 24015 3c9f99 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23993->24015 23995 3c9f81 23996 3c9f8d 23995->23996 24016 3c9fba GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23995->24016 23996->23954 23996->23956 23996->23958 23999 3ca09e SizeofResource 23998->23999 24002 3ca0d0 23998->24002 24000 3ca0b2 LoadResource 23999->24000 23999->24002 24001 3ca0c3 LockResource 24000->24001 24000->24002 24001->24002 24003 3ca0d7 GlobalAlloc 24001->24003 24002->23949 24003->24002 24004 3ca0f2 GlobalLock 24003->24004 24005 3ca181 GlobalFree 24004->24005 24006 3ca101 __vswprintf_c_l 24004->24006 24005->24002 24007 3ca17a GlobalUnlock 24006->24007 24017 3c9fdb GdipAlloc 24006->24017 24007->24005 24010 3ca14f GdipCreateHBITMAPFromBitmap 24011 3ca165 24010->24011 24011->24007 24012->23959 24013->23963 24014->23965 24015->23995 24016->23996 24018 3c9fed 24017->24018 24020 3c9ffa 24017->24020 24021 3c9d6f 24018->24021 24020->24007 24020->24010 24020->24011 24022 3c9d97 GdipCreateBitmapFromStream 24021->24022 24023 3c9d90 GdipCreateBitmapFromStreamICM 24021->24023 24024 3c9d9c 24022->24024 24023->24024 24024->24020 24026 3bd60b _wcschr __EH_prolog 24025->24026 24027 3bd63a GetModuleFileNameW 24026->24027 24028 3bd66b 24026->24028 24029 3bd654 24027->24029 24067 3b9b50 24028->24067 24029->24028 24032 3bd6c7 24078 3d5d80 26 API calls 3 library calls 24032->24078 24034 3bdcec 78 API calls 24036 3bd69b 24034->24036 24036->24032 24036->24034 24049 3bd8e7 24036->24049 24037 3bd6da 24079 3d5d80 26 API calls 3 library calls 24037->24079 24039 3bd823 24039->24049 24104 3b9ed0 79 API calls 24039->24104 24043 3bd83d ___std_exception_copy 24044 3b9d90 82 API calls 24043->24044 24043->24049 24047 3bd866 ___std_exception_copy 24044->24047 24046 3bd6ec 24046->24039 24046->24049 24080 3b9fe0 24046->24080 24095 3b9d90 24046->24095 24103 3b9ed0 79 API calls 24046->24103 24047->24049 24062 3bd872 ___std_exception_copy 24047->24062 24105 3c1692 MultiByteToWideChar 24047->24105 24088 3b97f0 24049->24088 24050 3bd9eb 24106 3bd13a 78 API calls 24050->24106 24052 3bdcca 24111 3bd13a 78 API calls 24052->24111 24054 3bdcba 24054->23968 24055 3bda31 24107 3d5d80 26 API calls 3 library calls 24055->24107 24057 3bda02 24057->24055 24059 3bdcec 78 API calls 24057->24059 24058 3bda4b 24108 3d5d80 26 API calls 3 library calls 24058->24108 24059->24057 24061 3c18ae WideCharToMultiByte 24061->24062 24062->24049 24062->24050 24062->24052 24062->24054 24062->24061 24109 3be046 50 API calls __vsnprintf 24062->24109 24110 3d5bc9 26 API calls 3 library calls 24062->24110 24066 3bd5ef 24065->24066 24066->23971 24068 3b9b5a 24067->24068 24069 3b9bd9 CreateFileW 24068->24069 24070 3b9c4a 24069->24070 24071 3b9bf9 GetLastError 24069->24071 24073 3b9c81 24070->24073 24075 3b9c67 SetFileTime 24070->24075 24072 3bb85c 2 API calls 24071->24072 24074 3b9c19 24072->24074 24073->24036 24074->24070 24076 3b9c1d CreateFileW GetLastError 24074->24076 24075->24073 24077 3b9c41 24076->24077 24077->24070 24078->24037 24079->24046 24081 3b9ff3 24080->24081 24082 3ba004 SetFilePointer 24080->24082 24083 3ba03d 24081->24083 24112 3b6f92 77 API calls 24081->24112 24082->24083 24084 3ba022 GetLastError 24082->24084 24083->24046 24084->24083 24086 3ba02c 24084->24086 24086->24083 24113 3b6f92 77 API calls 24086->24113 24089 3b9825 24088->24089 24090 3b9814 24088->24090 24089->23968 24090->24089 24091 3b9820 24090->24091 24092 3b9827 24090->24092 24114 3b99b7 24091->24114 24119 3b9870 24092->24119 24096 3b9d9c 24095->24096 24100 3b9da3 24095->24100 24096->24046 24098 3b9e3e 24098->24096 24146 3b6f51 77 API calls 24098->24146 24100->24096 24100->24098 24101 3b9e60 24100->24101 24134 3b99ee 24100->24134 24101->24096 24102 3b99ee 5 API calls 24101->24102 24102->24101 24103->24046 24104->24043 24105->24062 24106->24057 24107->24058 24108->24049 24109->24062 24110->24062 24111->24054 24112->24082 24113->24083 24115 3b99c0 24114->24115 24116 3b99c4 24114->24116 24115->24089 24116->24115 24125 3ba320 24116->24125 24120 3b989a 24119->24120 24121 3b987c 24119->24121 24122 3b98b9 24120->24122 24133 3b6e07 76 API calls 24120->24133 24121->24120 24123 3b9888 FindCloseChangeNotification 24121->24123 24122->24089 24123->24120 24126 3ce630 24125->24126 24127 3ba32d DeleteFileW 24126->24127 24128 3b99ec 24127->24128 24129 3ba340 24127->24129 24128->24089 24130 3bb85c 2 API calls 24129->24130 24131 3ba354 24130->24131 24131->24128 24132 3ba358 DeleteFileW 24131->24132 24132->24128 24133->24122 24135 3b99fc GetStdHandle 24134->24135 24136 3b9a07 ReadFile 24134->24136 24135->24136 24137 3b9a20 24136->24137 24141 3b9a40 24136->24141 24147 3b9b29 24137->24147 24139 3b9a27 24140 3b9a48 GetLastError 24139->24140 24142 3b9a57 24139->24142 24143 3b9a35 24139->24143 24140->24141 24140->24142 24141->24100 24142->24141 24144 3b9a67 GetLastError 24142->24144 24145 3b99ee GetFileType 24143->24145 24144->24141 24144->24143 24145->24141 24146->24096 24148 3b9b2f 24147->24148 24149 3b9b32 GetFileType 24147->24149 24148->24139 24150 3b9b40 24149->24150 24150->24139 24152 3ce517 ___std_exception_copy 24151->24152 24153 3c8a94 24152->24153 24157 3d749d 7 API calls 2 library calls 24152->24157 24158 3cef7e RaiseException __CxxThrowException@8 new 24152->24158 24159 3cef61 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 24152->24159 24153->23791 24157->24152 24161 3d7701 _GetRangeOfTrysToCheck 24160->24161 24162 3d7719 24161->24162 24163 3d784f _abort GetModuleHandleW 24161->24163 24182 3da701 EnterCriticalSection 24162->24182 24165 3d770d 24163->24165 24165->24162 24194 3d7893 GetModuleHandleExW 24165->24194 24166 3d77bf 24183 3d77ff 24166->24183 24170 3d7796 24174 3d77ae 24170->24174 24178 3d8511 _abort 5 API calls 24170->24178 24171 3d7721 24171->24166 24171->24170 24202 3d821f 20 API calls _abort 24171->24202 24172 3d77dc 24186 3d780e 24172->24186 24173 3d7808 24203 3e1ce9 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24173->24203 24179 3d8511 _abort 5 API calls 24174->24179 24178->24174 24179->24166 24182->24171 24204 3da751 LeaveCriticalSection 24183->24204 24185 3d77d8 24185->24172 24185->24173 24205 3dab46 24186->24205 24189 3d783c 24192 3d7893 _abort 8 API calls 24189->24192 24190 3d781c GetPEB 24190->24189 24191 3d782c GetCurrentProcess TerminateProcess 24190->24191 24191->24189 24193 3d7844 ExitProcess 24192->24193 24195 3d78bd GetProcAddress 24194->24195 24196 3d78e0 24194->24196 24200 3d78d2 24195->24200 24197 3d78ef 24196->24197 24198 3d78e6 FreeLibrary 24196->24198 24199 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24197->24199 24198->24197 24201 3d78f9 24199->24201 24200->24196 24201->24162 24202->24170 24204->24185 24206 3dab6b 24205->24206 24210 3dab61 24205->24210 24207 3da768 pre_c_initialization 5 API calls 24206->24207 24207->24210 24208 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24209 3d7818 24208->24209 24209->24189 24209->24190 24210->24208 24212 3b9cf9 24213 3b9d77 24212->24213 24216 3b9d03 24212->24216 24214 3b9d4d SetFilePointer 24214->24213 24215 3b9d6d GetLastError 24214->24215 24215->24213 24216->24214 25184 3c1cf0 26 API calls std::bad_exception::bad_exception 25185 3ceef0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25230 3c9df0 GdipCloneImage GdipAlloc 25186 3d32f0 5 API calls 2 library calls 25188 3b16d0 86 API calls 25189 3c72d0 117 API calls 25232 3da1d0 21 API calls 25233 3cc0d9 98 API calls 3 library calls 25077 3b10d5 25082 3b5b57 25077->25082 25083 3b5b61 __EH_prolog 25082->25083 25084 3bb26d 85 API calls 25083->25084 25085 3b5b6d 25084->25085 25088 3b5d4c GetCurrentProcess GetProcessAffinityMask 25085->25088 25235 3cddd2 19 API calls ___delayLoadHelper2@8 25092 3ba0cf 25093 3ba0e4 25092->25093 25098 3ba0dd 25092->25098 25094 3ba0ea GetStdHandle 25093->25094 25102 3ba0f5 25093->25102 25094->25102 25095 3ba149 WriteFile 25095->25102 25096 3ba11a 25097 3ba11c WriteFile 25096->25097 25096->25102 25097->25096 25097->25102 25100 3ba1d1 25104 3b70d6 77 API calls 25100->25104 25102->25095 25102->25096 25102->25097 25102->25098 25102->25100 25103 3b6ddc 78 API calls 25102->25103 25103->25102 25104->25098 25191 3ca6c0 73 API calls 25110 3ce4c1 25111 3ce4cb 25110->25111 25112 3ce221 ___delayLoadHelper2@8 19 API calls 25111->25112 25113 3ce4d8 25112->25113 25114 3da6c0 25115 3da6cb 25114->25115 25117 3da6f4 25115->25117 25118 3da6f0 25115->25118 25120 3da9da 25115->25120 25127 3da720 DeleteCriticalSection 25117->25127 25121 3da768 pre_c_initialization 5 API calls 25120->25121 25122 3daa01 25121->25122 25123 3daa1f InitializeCriticalSectionAndSpinCount 25122->25123 25124 3daa0a 25122->25124 25123->25124 25125 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25124->25125 25126 3daa36 25125->25126 25126->25115 25127->25118 25128 3d93c0 25136 3da87f 25128->25136 25131 3d93d4 25133 3d93dc 25134 3d93e9 25133->25134 25144 3d93f0 11 API calls 25133->25144 25137 3da768 pre_c_initialization 5 API calls 25136->25137 25138 3da8a6 25137->25138 25139 3da8be TlsAlloc 25138->25139 25140 3da8af 25138->25140 25139->25140 25141 3ceefa __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25140->25141 25142 3d93ca 25141->25142 25142->25131 25143 3d9339 20 API calls 2 library calls 25142->25143 25143->25133 25144->25131 25238 3cc0d9 103 API calls 4 library calls

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 003C03AA: GetModuleHandleW.KERNEL32(kernel32), ref: 003C03BF
                                            • Part of subcall function 003C03AA: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 003C03D1
                                            • Part of subcall function 003C03AA: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 003C0402
                                            • Part of subcall function 003CA004: GetCurrentDirectoryW.KERNEL32(?,?), ref: 003CA00C
                                            • Part of subcall function 003CA5C6: OleInitialize.OLE32(00000000), ref: 003CA5DF
                                            • Part of subcall function 003CA5C6: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 003CA616
                                            • Part of subcall function 003CA5C6: SHGetMalloc.SHELL32(003F8430), ref: 003CA620
                                            • Part of subcall function 003C16CB: GetCPInfo.KERNEL32(00000000,?), ref: 003C16DC
                                            • Part of subcall function 003C16CB: IsDBCSLeadByte.KERNEL32(00000000), ref: 003C16F0
                                          • GetCommandLineW.KERNEL32 ref: 003CD8D9
                                          • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 003CD900
                                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 003CD911
                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 003CD94B
                                            • Part of subcall function 003CD544: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 003CD55A
                                            • Part of subcall function 003CD544: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 003CD596
                                          • CloseHandle.KERNEL32(00000000), ref: 003CD954
                                          • GetModuleFileNameW.KERNEL32(00000000,0040DC90,00000800), ref: 003CD96F
                                          • SetEnvironmentVariableW.KERNEL32(sfxname,0040DC90), ref: 003CD97B
                                          • GetLocalTime.KERNEL32(?), ref: 003CD986
                                          • _swprintf.LIBCMT ref: 003CD9C5
                                          • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 003CD9D7
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 003CD9DE
                                          • LoadIconW.USER32(00000000,00000064), ref: 003CD9F5
                                          • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B170,00000000), ref: 003CDA46
                                          • Sleep.KERNEL32(?), ref: 003CDA74
                                          • DeleteObject.GDI32 ref: 003CDAAD
                                          • DeleteObject.GDI32(?), ref: 003CDABD
                                          • CloseHandle.KERNEL32 ref: 003CDB00
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xj@
                                          • API String ID: 788466649-1914628886
                                          • Opcode ID: 93d1c946c1395ff7afd4bdc8d03ff5c797a7b13c94d1c26d910a70fa5970f471
                                          • Instruction ID: 3027771d061ca98b979530d410fefefa892f826232699f07139aeef893eaea17
                                          • Opcode Fuzzy Hash: 93d1c946c1395ff7afd4bdc8d03ff5c797a7b13c94d1c26d910a70fa5970f471
                                          • Instruction Fuzzy Hash: F661F271904254AFD323AB66EC49F7A7BACAB49704F05053DF905EB2A2DBB88D04C761
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 615 3ca07c-3ca098 FindResourceW 616 3ca09e-3ca0b0 SizeofResource 615->616 617 3ca18f-3ca192 615->617 618 3ca0d0-3ca0d2 616->618 619 3ca0b2-3ca0c1 LoadResource 616->619 621 3ca18e 618->621 619->618 620 3ca0c3-3ca0ce LockResource 619->620 620->618 622 3ca0d7-3ca0ec GlobalAlloc 620->622 621->617 623 3ca188-3ca18d 622->623 624 3ca0f2-3ca0fb GlobalLock 622->624 623->621 625 3ca181-3ca182 GlobalFree 624->625 626 3ca101-3ca11f call 3cf750 624->626 625->623 630 3ca17a-3ca17b GlobalUnlock 626->630 631 3ca121-3ca143 call 3c9fdb 626->631 630->625 631->630 636 3ca145-3ca14d 631->636 637 3ca14f-3ca163 GdipCreateHBITMAPFromBitmap 636->637 638 3ca168-3ca176 636->638 637->638 639 3ca165 637->639 638->630 639->638
                                          APIs
                                          • FindResourceW.KERNEL32(003CB0DD,PNG,?,?,?,003CB0DD,00000066), ref: 003CA08E
                                          • SizeofResource.KERNEL32(00000000,00000000,?,?,?,003CB0DD,00000066), ref: 003CA0A6
                                          • LoadResource.KERNEL32(00000000,?,?,?,003CB0DD,00000066), ref: 003CA0B9
                                          • LockResource.KERNEL32(00000000,?,?,?,003CB0DD,00000066), ref: 003CA0C4
                                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,003CB0DD,00000066), ref: 003CA0E2
                                          • GlobalLock.KERNEL32(00000000,?,?,?,?,?,003CB0DD,00000066), ref: 003CA0F3
                                          • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 003CA15C
                                          • GlobalUnlock.KERNEL32(00000000), ref: 003CA17B
                                          • GlobalFree.KERNEL32(00000000), ref: 003CA182
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                          • String ID: PNG
                                          • API String ID: 4097654274-364855578
                                          • Opcode ID: fba5dc57eb916c80b94f480778c141f67495aa74fd98af9b6b6f3d71595c182b
                                          • Instruction ID: dee2885611aa6d95fb164c71921d38ab2d9b24f70728b5bcf090a569b3d37ab8
                                          • Opcode Fuzzy Hash: fba5dc57eb916c80b94f480778c141f67495aa74fd98af9b6b6f3d71595c182b
                                          • Instruction Fuzzy Hash: C8315E7260475AABC7229F21DC4CE2BBBADFB85755F06061CF906D7260EB31DC009B61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 825 3ba7e7-3ba812 call 3ce630 828 3ba884-3ba88d FindNextFileW 825->828 829 3ba814-3ba825 FindFirstFileW 825->829 830 3ba88f-3ba89d GetLastError 828->830 831 3ba8a3-3ba8a5 828->831 832 3ba8ab-3ba94f call 3c0131 call 3bbeff call 3c10e9 * 3 829->832 833 3ba82b-3ba842 call 3bb85c 829->833 830->831 831->832 834 3ba954-3ba967 831->834 832->834 840 3ba85d-3ba866 GetLastError 833->840 841 3ba844-3ba85b FindFirstFileW 833->841 843 3ba868-3ba86b 840->843 844 3ba877 840->844 841->832 841->840 843->844 845 3ba86d-3ba870 843->845 846 3ba879-3ba87f 844->846 845->844 848 3ba872-3ba875 845->848 846->834 848->846
                                          APIs
                                          • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,003BA6E2,000000FF,?,?), ref: 003BA81B
                                          • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,003BA6E2,000000FF,?,?), ref: 003BA851
                                          • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,003BA6E2,000000FF,?,?), ref: 003BA85D
                                          • FindNextFileW.KERNEL32(?,?,?,?,?,?,003BA6E2,000000FF,?,?), ref: 003BA885
                                          • GetLastError.KERNEL32(?,?,?,?,003BA6E2,000000FF,?,?), ref: 003BA891
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FileFind$ErrorFirstLast$Next
                                          • String ID:
                                          • API String ID: 869497890-0
                                          • Opcode ID: 779782e6092e4c7c2e0430394691dd022efec69cb4d5cf3f3652124949368535
                                          • Instruction ID: 320bedd327ed7aeba213fd36d42193750f3be5c3a7ee5e5e3412951f7a27b441
                                          • Opcode Fuzzy Hash: 779782e6092e4c7c2e0430394691dd022efec69cb4d5cf3f3652124949368535
                                          • Instruction Fuzzy Hash: 88419272504A81AFC326EF64C884ADAF7E8BF48354F010A2AF699D3650D734AD548B92
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?,003D77E4,?,003EBAD8,0000000C,003D793B,?,00000002,00000000), ref: 003D782F
                                          • TerminateProcess.KERNEL32(00000000,?,003D77E4,?,003EBAD8,0000000C,003D793B,?,00000002,00000000), ref: 003D7836
                                          • ExitProcess.KERNEL32 ref: 003D7848
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 561e4d2c14c227c4bbd34eb6d99dc64599c7eb491a921684e2f72c1e43f5ef84
                                          • Instruction ID: c4fcc1241f5c5c165a76425f8e945b59ec700d1a2d54f8af0568b3c329da7529
                                          • Opcode Fuzzy Hash: 561e4d2c14c227c4bbd34eb6d99dc64599c7eb491a921684e2f72c1e43f5ef84
                                          • Instruction Fuzzy Hash: 74E0BF32404544AFCF136F64ED4EA497F6EEB50351F014526F9098F262DB35DE42DA90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog_memcmp
                                          • String ID:
                                          • API String ID: 3004599000-0
                                          • Opcode ID: 8a730396865b4cd8cb884a5cf3f33a27505e0486cec8e0c5fbb3032ae09aa227
                                          • Instruction ID: 97a6ec0af2bb9f4e0d2e3f30304d132d6f79842c2b8b31e6807fe44ff02d6351
                                          • Opcode Fuzzy Hash: 8a730396865b4cd8cb884a5cf3f33a27505e0486cec8e0c5fbb3032ae09aa227
                                          • Instruction Fuzzy Hash: 18820B70904285AEDF27DF64C885BFABBBDAF05308F0941BADB599F942DB305A44C760
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: f669d7468cc6788b657c53328cdc43e6eaf98e74acc45b83f6670d74a80ed3f0
                                          • Instruction ID: c4fddad9ee62f1162574f6caf629d6a6a9b89072c10106226fa5c4956b397774
                                          • Opcode Fuzzy Hash: f669d7468cc6788b657c53328cdc43e6eaf98e74acc45b83f6670d74a80ed3f0
                                          • Instruction Fuzzy Hash: 48D104B1A043418FCB15CF28C886B9ABBE0FF94308F05456DE885DB642D734ED59CB9A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003CB175
                                            • Part of subcall function 003B130B: GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                            • Part of subcall function 003B130B: SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prologItemTextWindow
                                          • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                          • API String ID: 810644672-3617005944
                                          • Opcode ID: 7a6c3f94761991d4e2fbd35abbddbc8e1fc5d7c55024b783b5cea7ca9ce5866d
                                          • Instruction ID: 56d08a2e6177f3ac46ac8ff80dec20c8dd62b7a3402a3d7b3077c7d12ed94062
                                          • Opcode Fuzzy Hash: 7a6c3f94761991d4e2fbd35abbddbc8e1fc5d7c55024b783b5cea7ca9ce5866d
                                          • Instruction Fuzzy Hash: 7C42F371944258BEEB27ABA19D4AFFEBB7CAB01704F004168F645EA1D1CBB44D48CB25
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 257 3c03aa-3c03c9 call 3ce630 GetModuleHandleW 260 3c042f-3c068d 257->260 261 3c03cb-3c03e2 GetProcAddress 257->261 264 3c075f-3c078e GetModuleFileNameW call 3bbe89 call 3c0131 260->264 265 3c0693-3c069e call 3d73cd 260->265 262 3c03fc-3c040c GetProcAddress 261->262 263 3c03e4-3c03fa 261->263 262->260 267 3c040e-3c042d 262->267 263->262 278 3c0790-3c079a call 3baee5 264->278 265->264 273 3c06a4-3c06d5 GetModuleFileNameW CreateFileW 265->273 267->260 276 3c06d7-3c06e5 SetFilePointer 273->276 277 3c0753-3c075a CloseHandle 273->277 276->277 279 3c06e7-3c0704 ReadFile 276->279 277->264 285 3c079c-3c07a0 call 3c0360 278->285 286 3c07a7 278->286 279->277 282 3c0706-3c072b 279->282 284 3c0748-3c0751 call 3bfeb3 282->284 284->277 294 3c072d-3c0747 call 3c0360 284->294 291 3c07a5 285->291 289 3c07a9-3c07ab 286->289 292 3c07cd-3c07f3 call 3bbeff GetFileAttributesW 289->292 293 3c07ad-3c07cb CompareStringW 289->293 291->289 296 3c07f5-3c07f9 292->296 302 3c07fd 292->302 293->292 293->296 294->284 296->278 300 3c07fb 296->300 301 3c0801-3c0803 300->301 303 3c083b-3c083d 301->303 304 3c0805 301->304 302->301 306 3c094a-3c0954 303->306 307 3c0843-3c085a call 3bbed3 call 3baee5 303->307 305 3c0807-3c082d call 3bbeff GetFileAttributesW 304->305 312 3c082f-3c0833 305->312 313 3c0837 305->313 317 3c085c-3c08bd call 3c0360 * 2 call 3be0ac call 3b3f8f call 3be0ac call 3ca195 307->317 318 3c08c2-3c08f5 call 3b3f8f AllocConsole 307->318 312->305 315 3c0835 312->315 313->303 315->303 325 3c0942-3c0944 ExitProcess 317->325 324 3c08f7-3c093c GetCurrentProcessId AttachConsole call 3d3883 GetStdHandle WriteConsoleW Sleep FreeConsole 318->324 318->325 324->325
                                          APIs
                                          • GetModuleHandleW.KERNEL32(kernel32), ref: 003C03BF
                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 003C03D1
                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 003C0402
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 003C06AF
                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 003C06CB
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 003C06DD
                                          • ReadFile.KERNEL32(00000000,?,00007FFE,003E3BA4,00000000), ref: 003C06FC
                                          • CloseHandle.KERNEL32(00000000), ref: 003C0754
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 003C076A
                                          • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 003C07C2
                                          • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 003C07EB
                                          • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 003C0825
                                            • Part of subcall function 003C0360: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003C037B
                                            • Part of subcall function 003C0360: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003BEE61,Crypt32.dll,00000000,003BEEE5,?,?,003BEEC7,?,?,?), ref: 003C039D
                                          • _swprintf.LIBCMT ref: 003C0899
                                          • _swprintf.LIBCMT ref: 003C08E5
                                            • Part of subcall function 003B3F8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B3FA2
                                          • AllocConsole.KERNEL32 ref: 003C08ED
                                          • GetCurrentProcessId.KERNEL32 ref: 003C08F7
                                          • AttachConsole.KERNEL32(00000000), ref: 003C08FE
                                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 003C0924
                                          • WriteConsoleW.KERNEL32(00000000), ref: 003C092B
                                          • Sleep.KERNEL32(00002710), ref: 003C0936
                                          • FreeConsole.KERNEL32 ref: 003C093C
                                          • ExitProcess.KERNEL32 ref: 003C0944
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                          • String ID: <>$ ?>$(>>$(@>$0A>$4=>$8<>$<?>$@>>$@@>$D=>$DA>$DXGIDebug.dll$P<>$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$T;>$T?>$X>>$X@>$\A>$`=>$dwmapi.dll$kernel32$l<>$p>>$p?>$p@>$uxtheme.dll$x=>$|<>$>>$?>
                                          • API String ID: 1201351596-343326509
                                          • Opcode ID: 3a85c11d5ccdedf2e7092f52065852049ea2038b915f5321f1d5df77944e1b34
                                          • Instruction ID: 042385ba2be096c9cd376a0a7c66681ef8af8da464d967ec2afb6336f8a8f364
                                          • Opcode Fuzzy Hash: 3a85c11d5ccdedf2e7092f52065852049ea2038b915f5321f1d5df77944e1b34
                                          • Instruction Fuzzy Hash: 51D151B55083D4EBD7379F51D84DBDFBAE8AB84704F104A1CF6899B2D0C7B09A488B52
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 406 3bd601-3bd638 call 3ce554 call 3ce630 call 3d181a 413 3bd66b-3bd674 call 3c0131 406->413 414 3bd63a-3bd669 GetModuleFileNameW call 3bbe89 call 3c0109 406->414 418 3bd679-3bd69d call 3b97b6 call 3b9b50 413->418 414->418 425 3bd6a3-3bd6ab 418->425 426 3bda60-3bda66 call 3b97f0 418->426 428 3bd6c9-3bd6f8 call 3d5d80 * 2 425->428 429 3bd6ad-3bd6c5 call 3bdcec * 2 425->429 430 3bda6b-3bda7b 426->430 440 3bd6fb-3bd6fe 428->440 439 3bd6c7 429->439 439->428 441 3bd82c-3bd84f call 3b9ed0 call 3d38a3 440->441 442 3bd704-3bd70a call 3b9fe0 440->442 441->426 451 3bd855-3bd870 call 3b9d90 441->451 446 3bd70f-3bd736 call 3b9d90 442->446 452 3bd73c-3bd744 446->452 453 3bd7f5-3bd7f8 446->453 465 3bd879-3bd88c call 3d38a3 451->465 466 3bd872-3bd877 451->466 455 3bd76f-3bd77a 452->455 456 3bd746-3bd74e 452->456 457 3bd7fb-3bd81d call 3b9ed0 453->457 460 3bd77c-3bd788 455->460 461 3bd7a5-3bd7ad 455->461 456->455 459 3bd750-3bd76a call 3d61b0 456->459 457->440 476 3bd823-3bd826 457->476 481 3bd7eb-3bd7f3 459->481 482 3bd76c 459->482 460->461 468 3bd78a-3bd78f 460->468 463 3bd7d9-3bd7dd 461->463 464 3bd7af-3bd7b7 461->464 463->453 471 3bd7df-3bd7e2 463->471 464->463 470 3bd7b9-3bd7d3 call 3d61b0 464->470 465->426 486 3bd892-3bd8ae call 3c1692 call 3d389e 465->486 472 3bd8b1-3bd8b8 466->472 468->461 475 3bd791-3bd7a3 call 3d5af8 468->475 470->426 470->463 471->452 477 3bd8ba 472->477 478 3bd8bc-3bd8e5 call 3c00d6 call 3d38a3 472->478 475->461 488 3bd7e7 475->488 476->426 476->441 477->478 495 3bd8f3-3bd909 478->495 496 3bd8e7-3bd8ee call 3d389e 478->496 481->457 482->455 486->472 488->481 499 3bd90f-3bd91d 495->499 500 3bd9f1-3bda17 call 3bd13a call 3d389e * 2 495->500 496->426 503 3bd924-3bd929 499->503 536 3bda19-3bda2f call 3bdcec * 2 500->536 537 3bda31-3bda5d call 3d5d80 * 2 500->537 505 3bd92f-3bd938 503->505 506 3bdc3c-3bdc44 503->506 510 3bd93a-3bd93e 505->510 511 3bd944-3bd94b 505->511 507 3bd9eb-3bd9ee 506->507 508 3bdc4a-3bdc4e 506->508 507->500 512 3bdc9e-3bdca4 508->512 513 3bdc50-3bdc56 508->513 510->506 510->511 515 3bd951-3bd976 511->515 516 3bdb40-3bdb51 call 3bff9a 511->516 522 3bdcca-3bdcea call 3bd13a 512->522 523 3bdca6-3bdcac 512->523 518 3bdc5c-3bdc63 513->518 519 3bd9e2-3bd9e5 513->519 517 3bd979-3bd99e call 3d3883 call 3d5af8 515->517 538 3bdb57-3bdb80 call 3c0131 call 3d5b75 516->538 539 3bdc36-3bdc39 516->539 554 3bd9a0-3bd9aa 517->554 555 3bd9b6 517->555 525 3bdc8a 518->525 526 3bdc65-3bdc68 518->526 519->503 519->507 541 3bdcc2-3bdcc5 522->541 523->522 530 3bdcae-3bdcb4 523->530 540 3bdc8c-3bdc99 525->540 533 3bdc6a-3bdc6d 526->533 534 3bdc86-3bdc88 526->534 530->519 531 3bdcba-3bdcc1 530->531 531->541 543 3bdc6f-3bdc72 533->543 544 3bdc82-3bdc84 533->544 534->540 536->537 537->426 538->539 566 3bdb86-3bdbfc call 3c18ae call 3c00d6 call 3c00af call 3c00d6 call 3d5bc9 538->566 539->506 540->519 549 3bdc7e-3bdc80 543->549 550 3bdc74-3bdc78 543->550 544->540 549->540 550->530 556 3bdc7a-3bdc7c 550->556 554->555 560 3bd9ac-3bd9b4 554->560 561 3bd9b9-3bd9bd 555->561 556->540 560->561 561->517 565 3bd9bf-3bd9c6 561->565 567 3bda7e-3bda81 565->567 568 3bd9cc-3bd9da call 3c00d6 565->568 599 3bdc0a-3bdc1f 566->599 600 3bdbfe-3bdc07 566->600 567->516 571 3bda87-3bda8e 567->571 576 3bd9df 568->576 574 3bda90-3bda94 571->574 575 3bda96-3bda97 571->575 574->575 578 3bda99-3bdaa7 574->578 575->571 576->519 580 3bdaa9-3bdaac 578->580 581 3bdac8-3bdaf0 call 3c18ae 578->581 583 3bdaae-3bdac3 580->583 584 3bdac5 580->584 589 3bdb13-3bdb1b 581->589 590 3bdaf2-3bdb0e call 3d38b9 581->590 583->580 583->584 584->581 591 3bdb1d 589->591 592 3bdb22-3bdb3b call 3be046 589->592 590->576 591->592 592->576 601 3bdc20-3bdc27 599->601 600->599 602 3bdc29-3bdc2d 601->602 603 3bdc33-3bdc34 601->603 602->576 602->603 603->601
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003BD606
                                          • _wcschr.LIBVCRUNTIME ref: 003BD627
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,003BD5E8,?), ref: 003BD642
                                          • __fprintf_l.LIBCMT ref: 003BDB33
                                            • Part of subcall function 003C1692: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,003BB842,00000000,?,?,?,0001044A), ref: 003C16AE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                                          • String ID: $ ,$$%s:$$9>$*messages***$*messages***$@%s:$R$RTL$a
                                          • API String ID: 4184910265-4034039138
                                          • Opcode ID: 3d80f8c6bc2416331274994481898786661eb60be3d457d2761cb123914c87bd
                                          • Instruction ID: 7c5fc0247ed512afe5df4a90db39bc72a7887216e28567e6505db5f6db4a513f
                                          • Opcode Fuzzy Hash: 3d80f8c6bc2416331274994481898786661eb60be3d457d2761cb123914c87bd
                                          • Instruction Fuzzy Hash: F212B3719002599ADF26DFA4DC45BEEB7B9FF04318F14016AF205ABA81FB709E44CB64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 003CAF04: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003CAF15
                                            • Part of subcall function 003CAF04: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003CAF26
                                            • Part of subcall function 003CAF04: IsDialogMessageW.USER32(0001044A,?), ref: 003CAF3A
                                            • Part of subcall function 003CAF04: TranslateMessage.USER32(?), ref: 003CAF48
                                            • Part of subcall function 003CAF04: DispatchMessageW.USER32(?), ref: 003CAF52
                                          • GetDlgItem.USER32(00000068,0040ECB0), ref: 003CCE32
                                          • ShowWindow.USER32(00000000,00000005,?,?,?,003CA8C2,00000001,?,?,003CB15B,003E4F88,0040ECB0,0040ECB0,00001000,00000000,00000000), ref: 003CCE5A
                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 003CCE65
                                          • SendMessageW.USER32(00000000,000000C2,00000000,003E35B4), ref: 003CCE73
                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 003CCE89
                                          • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 003CCEA3
                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 003CCEE7
                                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 003CCEF5
                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 003CCF04
                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 003CCF2B
                                          • SendMessageW.USER32(00000000,000000C2,00000000,003E431C), ref: 003CCF3A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                          • String ID: \
                                          • API String ID: 3569833718-2967466578
                                          • Opcode ID: 9370f818901c57097618b69d9c4c812bcb44bdf969ae5699790cc90e8b893262
                                          • Instruction ID: 5b1aab17efe4d9fa40eb66d0c6224588beb7b4ab6217eaf65ef8fccd71c31a47
                                          • Opcode Fuzzy Hash: 9370f818901c57097618b69d9c4c812bcb44bdf969ae5699790cc90e8b893262
                                          • Instruction Fuzzy Hash: 4231CB71245750BBE302DF209D49FAB7FACEB96704F00452CF681D61A1CBA45A188BAA
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 641 3cd0df-3cd0f7 call 3ce630 644 3cd0fd-3cd109 call 3d3883 641->644 645 3cd348-3cd350 641->645 644->645 648 3cd10f-3cd137 call 3cf5f0 644->648 651 3cd139 648->651 652 3cd141-3cd14e 648->652 651->652 653 3cd150 652->653 654 3cd152-3cd15b 652->654 653->654 655 3cd15d-3cd15f 654->655 656 3cd193 654->656 657 3cd167-3cd16a 655->657 658 3cd197-3cd19a 656->658 659 3cd2f9-3cd2fe 657->659 660 3cd170-3cd178 657->660 661 3cd19c-3cd19f 658->661 662 3cd1a1-3cd1a3 658->662 665 3cd300 659->665 666 3cd2f3-3cd2f7 659->666 663 3cd17e-3cd184 660->663 664 3cd312-3cd31a 660->664 661->662 667 3cd1b6-3cd1cb call 3bb683 661->667 662->667 668 3cd1a5-3cd1ac 662->668 663->664 669 3cd18a-3cd191 663->669 671 3cd31c-3cd31e 664->671 672 3cd322-3cd32a 664->672 670 3cd305-3cd309 665->670 666->659 666->670 676 3cd1cd-3cd1da call 3c1ac4 667->676 677 3cd1e4-3cd1ef call 3ba373 667->677 668->667 673 3cd1ae 668->673 669->656 669->657 670->664 671->672 672->658 673->667 676->677 682 3cd1dc 676->682 683 3cd20c-3cd219 ShellExecuteExW 677->683 684 3cd1f1-3cd208 call 3bb429 677->684 682->677 686 3cd21f-3cd22c 683->686 687 3cd347 683->687 684->683 689 3cd22e-3cd235 686->689 690 3cd23f-3cd241 686->690 687->645 689->690 691 3cd237-3cd23d 689->691 692 3cd258-3cd277 call 3cd5a3 690->692 693 3cd243-3cd24c 690->693 691->690 694 3cd2ae-3cd2ba CloseHandle 691->694 692->694 709 3cd279-3cd281 692->709 693->692 701 3cd24e-3cd256 ShowWindow 693->701 696 3cd2bc-3cd2c9 call 3c1ac4 694->696 697 3cd2cb-3cd2d9 694->697 696->697 711 3cd32f 696->711 699 3cd2db-3cd2dd 697->699 700 3cd336-3cd338 697->700 699->700 704 3cd2df-3cd2e5 699->704 700->687 706 3cd33a-3cd33c 700->706 701->692 704->700 708 3cd2e7-3cd2f1 704->708 706->687 710 3cd33e-3cd341 ShowWindow 706->710 708->700 709->694 712 3cd283-3cd294 GetExitCodeProcess 709->712 710->687 711->700 712->694 713 3cd296-3cd2a0 712->713 714 3cd2a7 713->714 715 3cd2a2 713->715 714->694 715->714
                                          APIs
                                          • ShellExecuteExW.SHELL32(?), ref: 003CD211
                                          • ShowWindow.USER32(?,00000000), ref: 003CD250
                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 003CD28C
                                          • CloseHandle.KERNEL32(?), ref: 003CD2B2
                                          • ShowWindow.USER32(?,00000001), ref: 003CD341
                                            • Part of subcall function 003C1AC4: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003BB250,?,?,?,003BB1FE,?,-00000002,?,00000000,?), ref: 003C1ADA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                          • String ID: $.exe$.inf
                                          • API String ID: 3686203788-2452507128
                                          • Opcode ID: 11593f33b469528826c7e2d4629a7c60ba41f66c1d474e084acb5af94c45e164
                                          • Instruction ID: f5ca9d6197600f7834dcdb07b5d972ed116ebdf418db141c5ce0bab29c61effd
                                          • Opcode Fuzzy Hash: 11593f33b469528826c7e2d4629a7c60ba41f66c1d474e084acb5af94c45e164
                                          • Instruction Fuzzy Hash: D0618A745043809AE733AF259904FABBBE9AB91304F09483DF5C4D7191E7B1CD84DB96
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 716 3da368-3da381 717 3da397-3da39c 716->717 718 3da383-3da393 call 3de9bc 716->718 720 3da39e-3da3a6 717->720 721 3da3a9-3da3cd MultiByteToWideChar 717->721 718->717 725 3da395 718->725 720->721 723 3da560-3da573 call 3ceefa 721->723 724 3da3d3-3da3df 721->724 726 3da3e1-3da3f2 724->726 727 3da433 724->727 725->717 730 3da3f4-3da403 call 3e1d00 726->730 731 3da411-3da422 call 3d8838 726->731 729 3da435-3da437 727->729 733 3da43d-3da450 MultiByteToWideChar 729->733 734 3da555 729->734 730->734 744 3da409-3da40f 730->744 731->734 741 3da428 731->741 733->734 737 3da456-3da468 call 3daa3c 733->737 738 3da557-3da55e call 3da5d0 734->738 746 3da46d-3da471 737->746 738->723 745 3da42e-3da431 741->745 744->745 745->729 746->734 748 3da477-3da47e 746->748 749 3da4b8-3da4c4 748->749 750 3da480-3da485 748->750 751 3da4c6-3da4d7 749->751 752 3da510 749->752 750->738 753 3da48b-3da48d 750->753 754 3da4d9-3da4e8 call 3e1d00 751->754 755 3da4f2-3da503 call 3d8838 751->755 756 3da512-3da514 752->756 753->734 757 3da493-3da4ad call 3daa3c 753->757 760 3da54e-3da554 call 3da5d0 754->760 768 3da4ea-3da4f0 754->768 755->760 770 3da505 755->770 756->760 761 3da516-3da52f call 3daa3c 756->761 757->738 772 3da4b3 757->772 760->734 761->760 774 3da531-3da538 761->774 773 3da50b-3da50e 768->773 770->773 772->734 773->756 775 3da53a-3da53b 774->775 776 3da574-3da57a 774->776 777 3da53c-3da54c WideCharToMultiByte 775->777 776->777 777->760 778 3da57c-3da583 call 3da5d0 777->778 778->738
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,kR=,003D526B,?,?,?,003DA5B9,00000001,00000001,8FE85006), ref: 003DA3C2
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,003DA5B9,00000001,00000001,8FE85006,?,?,?), ref: 003DA448
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 003DA542
                                          • __freea.LIBCMT ref: 003DA54F
                                            • Part of subcall function 003D8838: RtlAllocateHeap.NTDLL(00000000,?,?,?,003D3CF6,?,0000015D,?,?,?,?,003D51D2,000000FF,00000000,?,?), ref: 003D886A
                                          • __freea.LIBCMT ref: 003DA558
                                          • __freea.LIBCMT ref: 003DA57D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                          • String ID: kR=
                                          • API String ID: 1414292761-1797688852
                                          • Opcode ID: ae24c7fc4a401a8bad62ca6e4bc55ff70d207aa33f20a8ab9786da047299c2d8
                                          • Instruction ID: d9105c7d010b60fbfed242b5fb3c022855fa163d9e08dd0742db75f4ef63a5f5
                                          • Opcode Fuzzy Hash: ae24c7fc4a401a8bad62ca6e4bc55ff70d207aa33f20a8ab9786da047299c2d8
                                          • Instruction Fuzzy Hash: 8F51D373A00616AFDB268E64FD41EBF77AADB41750F16462AFC05DA240EB34DC40C662
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 781 3da804-3da818 782 3da81a-3da823 781->782 783 3da825-3da840 LoadLibraryExW 781->783 784 3da87c-3da87e 782->784 785 3da869-3da86f 783->785 786 3da842-3da84b GetLastError 783->786 787 3da878 785->787 788 3da871-3da872 FreeLibrary 785->788 789 3da84d-3da858 LoadLibraryExW 786->789 790 3da85a 786->790 791 3da87a-3da87b 787->791 788->787 792 3da85c-3da85e 789->792 790->792 791->784 792->785 793 3da860-3da867 792->793 793->791
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,_;=,00000000,00000000,?,003DA7AB,_;=,00000000,00000000,00000000,?,003DA9A8,00000006,FlsSetValue), ref: 003DA836
                                          • GetLastError.KERNEL32(?,003DA7AB,_;=,00000000,00000000,00000000,?,003DA9A8,00000006,FlsSetValue,003E7348,003E7350,00000000,00000364,?,003D9387), ref: 003DA842
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,003DA7AB,_;=,00000000,00000000,00000000,?,003DA9A8,00000006,FlsSetValue,003E7348,003E7350,00000000), ref: 003DA850
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID: _;=
                                          • API String ID: 3177248105-4235924406
                                          • Opcode ID: 052d157404c517f6f8fc8d78f3f6b5bf73f6f35013083f62b37ea9fe9f7584b9
                                          • Instruction ID: 8354e5072bbb649a208525aefc640768dfd020f2ebb0b68a877f970d7b9fb8ca
                                          • Opcode Fuzzy Hash: 052d157404c517f6f8fc8d78f3f6b5bf73f6f35013083f62b37ea9fe9f7584b9
                                          • Instruction Fuzzy Hash: 1B012433602636ABC7334A69BC88A66BF5CAF057A2B110626FD06D73C0D720D90286E0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 794 3b9b50-3b9b71 call 3ce630 797 3b9b7c 794->797 798 3b9b73-3b9b76 794->798 800 3b9b7e-3b9b9b 797->800 798->797 799 3b9b78-3b9b7a 798->799 799->800 801 3b9b9d 800->801 802 3b9ba3-3b9bad 800->802 801->802 803 3b9baf 802->803 804 3b9bb2-3b9bd1 call 3b7119 802->804 803->804 807 3b9bd9-3b9bf7 CreateFileW 804->807 808 3b9bd3 804->808 809 3b9c5b-3b9c60 807->809 810 3b9bf9-3b9c1b GetLastError call 3bb85c 807->810 808->807 812 3b9c62-3b9c65 809->812 813 3b9c81-3b9c95 809->813 819 3b9c4a-3b9c4f 810->819 820 3b9c1d-3b9c3f CreateFileW GetLastError 810->820 812->813 817 3b9c67-3b9c7b SetFileTime 812->817 814 3b9cb3-3b9cbe 813->814 815 3b9c97-3b9caf call 3c0131 813->815 815->814 817->813 819->809 824 3b9c51 819->824 822 3b9c41 820->822 823 3b9c45-3b9c48 820->823 822->823 823->809 823->819 824->809
                                          APIs
                                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,003B797C,?,00000005,?,00000011), ref: 003B9BEC
                                          • GetLastError.KERNEL32(?,?,003B797C,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003B9BF9
                                          • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,003B797C,?,00000005,?), ref: 003B9C2E
                                          • GetLastError.KERNEL32(?,?,003B797C,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003B9C36
                                          • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,003B797C,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003B9C7B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: File$CreateErrorLast$Time
                                          • String ID:
                                          • API String ID: 1999340476-0
                                          • Opcode ID: a92776f94fe6e168ab25fe37077e4e02c02080ceff6e0f949dd37453dea2ff6f
                                          • Instruction ID: d88e0d2014245a7f8e63bd1d2244fdfc6078085f45810ac884793bb5674179d3
                                          • Opcode Fuzzy Hash: a92776f94fe6e168ab25fe37077e4e02c02080ceff6e0f949dd37453dea2ff6f
                                          • Instruction Fuzzy Hash: BD4155305447826BE332CF30DC4ABDABFD4AB04328F10071AFBA5869D0D3B499888B95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 003C0D11: ResetEvent.KERNEL32(?), ref: 003C0D23
                                            • Part of subcall function 003C0D11: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 003C0D37
                                          • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 003C0A6A
                                          • FindCloseChangeNotification.KERNELBASE(?,?), ref: 003C0A84
                                          • DeleteCriticalSection.KERNEL32(?), ref: 003C0A9D
                                          • CloseHandle.KERNEL32(?), ref: 003C0AA9
                                          • CloseHandle.KERNEL32(?), ref: 003C0AB5
                                            • Part of subcall function 003C0B29: WaitForSingleObject.KERNEL32(?,000000FF,003C0C48,?,?,003C0CBF,?,?,?,?,?,003C0CA9), ref: 003C0B2F
                                            • Part of subcall function 003C0B29: GetLastError.KERNEL32(?,?,003C0CBF,?,?,?,?,?,003C0CA9), ref: 003C0B3B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Close$HandleReleaseSemaphore$ChangeCriticalDeleteErrorEventFindLastNotificationObjectResetSectionSingleWait
                                          • String ID:
                                          • API String ID: 565839277-0
                                          • Opcode ID: 1f71bff062038798dc8af45fd1b74c4ba1cfbb1e2e383ceb1ec29244a3d5ea8f
                                          • Instruction ID: 71d8f0d957c27fd114fc0b94d76cf1f2ace7494036e1c6b303c5f0b9e6bf2db1
                                          • Opcode Fuzzy Hash: 1f71bff062038798dc8af45fd1b74c4ba1cfbb1e2e383ceb1ec29244a3d5ea8f
                                          • Instruction Fuzzy Hash: 70018071500784EBC7339B69DC88FD6BBADFB48710F004659F15B861A0CB716E44CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 861 3caf04-3caf1d PeekMessageW 862 3caf1f-3caf33 GetMessageW 861->862 863 3caf58-3caf5c 861->863 864 3caf44-3caf52 TranslateMessage DispatchMessageW 862->864 865 3caf35-3caf42 IsDialogMessageW 862->865 864->863 865->863 865->864
                                          APIs
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003CAF15
                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003CAF26
                                          • IsDialogMessageW.USER32(0001044A,?), ref: 003CAF3A
                                          • TranslateMessage.USER32(?), ref: 003CAF48
                                          • DispatchMessageW.USER32(?), ref: 003CAF52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Message$DialogDispatchPeekTranslate
                                          • String ID:
                                          • API String ID: 1266772231-0
                                          • Opcode ID: 418861528a63b9c7c72f164521e902a02117a53717de7cb1e3440e202815982a
                                          • Instruction ID: d46e2cb524a92e2e38691d9fa96fb76574e35f46501cfda57f8e5ad709826c15
                                          • Opcode Fuzzy Hash: 418861528a63b9c7c72f164521e902a02117a53717de7cb1e3440e202815982a
                                          • Instruction Fuzzy Hash: EDF03071D0111DAB8B20EBE2DD4CEEB7FACEE092517408529F609D2100EB74D415C7F5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 866 3d798e-3d799b 867 3d799d-3d79a1 866->867 868 3d79b9-3d79e2 call 3db5a0 GetModuleFileNameA 866->868 867->868 870 3d79a3-3d79b4 call 3d8c7a call 3d8b59 867->870 874 3d79e9 868->874 875 3d79e4-3d79e7 868->875 880 3d7aad-3d7ab1 870->880 877 3d79eb-3d7a15 call 3d7ab2 call 3d7c27 874->877 875->874 875->877 884 3d7a17-3d7a21 call 3d8c7a 877->884 885 3d7a23-3d7a40 call 3d7ab2 877->885 890 3d7a54-3d7a56 884->890 891 3d7a58-3d7a6b call 3db0b3 885->891 892 3d7a42-3d7a4f 885->892 893 3d7aa2-3d7aac call 3d87fe 890->893 898 3d7a6d-3d7a70 891->898 899 3d7a72-3d7a7b 891->899 892->890 893->880 900 3d7a98-3d7a9f call 3d87fe 898->900 901 3d7a7d-3d7a83 899->901 902 3d7a85-3d7a92 899->902 900->893 901->901 901->902 902->900
                                          APIs
                                          • GetModuleFileNameA.KERNELBASE(00000000,C:\Users\user\Desktop\noway-2D8EB.exe,00000104), ref: 003D79CE
                                          • _free.LIBCMT ref: 003D7A99
                                          • _free.LIBCMT ref: 003D7AA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\Desktop\noway-2D8EB.exe
                                          • API String ID: 2506810119-756640837
                                          • Opcode ID: 4cf34ab8f456f3c33b3a80ec6898347afb2a64bd71ea7738403a44515809ec2d
                                          • Instruction ID: 4b78ec20575bab45f0ecf7b9ed496f17a1b8c6dc94b0b63b74134fc01b0b2f51
                                          • Opcode Fuzzy Hash: 4cf34ab8f456f3c33b3a80ec6898347afb2a64bd71ea7738403a44515809ec2d
                                          • Instruction Fuzzy Hash: 4E316D72A05218EFDB23DF99ED85D9EBBBCEB85310F154067E9049B311E6719E408B60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 905 3ca558-3ca577 GetClassNameW 906 3ca59f-3ca5a1 905->906 907 3ca579-3ca58e call 3c1ac4 905->907 909 3ca5ac-3ca5b0 906->909 910 3ca5a3-3ca5a6 SHAutoComplete 906->910 912 3ca59e 907->912 913 3ca590-3ca59c FindWindowExW 907->913 910->909 912->906 913->912
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000050), ref: 003CA56F
                                          • SHAutoComplete.SHLWAPI(?,00000010), ref: 003CA5A6
                                            • Part of subcall function 003C1AC4: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003BB250,?,?,?,003BB1FE,?,-00000002,?,00000000,?), ref: 003C1ADA
                                          • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 003CA596
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                                          • String ID: EDIT
                                          • API String ID: 4243998846-3080729518
                                          • Opcode ID: 143490cb3d200f754f3beb20fcad8ceab4880c9ad7179143b8839466961b1a42
                                          • Instruction ID: effaa4dafb61e4268844c1f922b05a68271ed6ce1e17b8911b42ae22e2297ed7
                                          • Opcode Fuzzy Hash: 143490cb3d200f754f3beb20fcad8ceab4880c9ad7179143b8839466961b1a42
                                          • Instruction Fuzzy Hash: 20F0E932B0172C6BD72156759C05FDB766C9B4BB00F054165BE44E6180D7A09E11C7FA
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 003C0360: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003C037B
                                            • Part of subcall function 003C0360: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003BEE61,Crypt32.dll,00000000,003BEEE5,?,?,003BEEC7,?,?,?), ref: 003C039D
                                          • OleInitialize.OLE32(00000000), ref: 003CA5DF
                                          • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 003CA616
                                          • SHGetMalloc.SHELL32(003F8430), ref: 003CA620
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                          • String ID: riched20.dll
                                          • API String ID: 3498096277-3360196438
                                          • Opcode ID: 7d0ff26e963cbae199658c8ab8866cf1f9f1792c7c5c0dda42c53864aa5f6318
                                          • Instruction ID: 512f20b5625117a28d769edb03c0ccc0d1ddf1b09697062835305738e33e68d6
                                          • Opcode Fuzzy Hash: 7d0ff26e963cbae199658c8ab8866cf1f9f1792c7c5c0dda42c53864aa5f6318
                                          • Instruction Fuzzy Hash: 30F04FB1C0010DABCB10AF99D9499EFFFFCEF44701F00416AE904E2240DBB446058BA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 003CD55A
                                          • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 003CD596
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: EnvironmentVariable
                                          • String ID: sfxcmd$sfxpar
                                          • API String ID: 1431749950-3493335439
                                          • Opcode ID: 2e119a4e489d72c936938ea8b2cc6434650c4c5c433d6e6b855d1240364a67ed
                                          • Instruction ID: 1742c848007f10a3a26369090e722114562488c57d82d2df49bd9bc2f67dfceb
                                          • Opcode Fuzzy Hash: 2e119a4e489d72c936938ea8b2cc6434650c4c5c433d6e6b855d1240364a67ed
                                          • Instruction Fuzzy Hash: FEF0A772811238BACB232F958C49FFA775CAF15745F000129FD84DA282D7718D50D7E0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 003B99FE
                                          • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 003B9A16
                                          • GetLastError.KERNEL32 ref: 003B9A48
                                          • GetLastError.KERNEL32 ref: 003B9A67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorLast$FileHandleRead
                                          • String ID:
                                          • API String ID: 2244327787-0
                                          • Opcode ID: e089c9f608c6a6957846bcd2d299b4ff8cb9bbdbaea09de11589793428c0879e
                                          • Instruction ID: cd450950e1cbd054482a7a51cbfe3d454937885d765fc292436271fc2352c860
                                          • Opcode Fuzzy Hash: e089c9f608c6a6957846bcd2d299b4ff8cb9bbdbaea09de11589793428c0879e
                                          • Instruction Fuzzy Hash: F0117030500504EFCB229B50CC05BF93BADEB05769F11862BFB6B8ADA0D7399E409F51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003D92B5: GetLastError.KERNEL32(?,003F0F50,003D40E4,003F0F50,?,?,003D3B5F,?,?,003F0F50), ref: 003D92B9
                                            • Part of subcall function 003D92B5: _free.LIBCMT ref: 003D92EC
                                            • Part of subcall function 003D92B5: SetLastError.KERNEL32(00000000,?,003F0F50), ref: 003D932D
                                            • Part of subcall function 003D92B5: _abort.LIBCMT ref: 003D9333
                                            • Part of subcall function 003DB5BE: _abort.LIBCMT ref: 003DB5F0
                                            • Part of subcall function 003DB5BE: _free.LIBCMT ref: 003DB624
                                            • Part of subcall function 003DB22B: GetOEMCP.KERNEL32(00000000,?,?,003DB4B4,?), ref: 003DB256
                                          • _free.LIBCMT ref: 003DB50F
                                          • _free.LIBCMT ref: 003DB545
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$ErrorLast_abort
                                          • String ID: >
                                          • API String ID: 2991157371-3623353604
                                          • Opcode ID: 247c885ef98243fcc5a4820beee81b0cc92b93269d905a2ca892d9ed16b4bb08
                                          • Instruction ID: 49193b96e030a95bcba3bd6f29b06fa819b97bedbc14d23d9334b77b584d18f4
                                          • Opcode Fuzzy Hash: 247c885ef98243fcc5a4820beee81b0cc92b93269d905a2ca892d9ed16b4bb08
                                          • Instruction Fuzzy Hash: 2E315033904108EFDB12ABA9F841B69B7E6EF42360F66419AE4049F391DB319E51CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 003DA7C8
                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 003DA7D5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AddressProc__crt_fast_encode_pointer
                                          • String ID: _;=
                                          • API String ID: 2279764990-4235924406
                                          • Opcode ID: 02e42f0645077eff392465d349c3b64c4a399d4aeba68baa2b2b4a8934858e62
                                          • Instruction ID: e8e51b3551f63636de0fe6bd909ea8897e67dfc23044b1ba0b83031235bdf106
                                          • Opcode Fuzzy Hash: 02e42f0645077eff392465d349c3b64c4a399d4aeba68baa2b2b4a8934858e62
                                          • Instruction Fuzzy Hash: 1F11E337A119259B9F239F68FD8089A73B9AB84320B164222FC15AF394D630DD4186D2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateThread.KERNELBASE(00000000,00010000,Function_00010CA0,?,00000000,00000000), ref: 003C0B88
                                          • SetThreadPriority.KERNEL32(?,00000000), ref: 003C0BCF
                                            • Part of subcall function 003B6E68: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B6E86
                                            • Part of subcall function 003B7002: _wcschr.LIBVCRUNTIME ref: 003B7043
                                            • Part of subcall function 003B7002: _wcschr.LIBVCRUNTIME ref: 003B7053
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Thread_wcschr$CreatePriority__vswprintf_c_l
                                          • String ID: CreateThread failed
                                          • API String ID: 2706921342-3849766595
                                          • Opcode ID: fa8d1d9b0768df5d427d7b6e7c793c88303e2faaacf275b48083c52f99b00f49
                                          • Instruction ID: 013da3b91ad703d6181368d79184b82808e3967695799e7e39c321a0b89c3aa2
                                          • Opcode Fuzzy Hash: fa8d1d9b0768df5d427d7b6e7c793c88303e2faaacf275b48083c52f99b00f49
                                          • Instruction Fuzzy Hash: D0016276244349ABD62BAB58AD86FB67398EB44715F20052DF646AA185CAA1AC408720
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,003BCE98,00000001,?,?,?,00000000,003C510E,?,?,?), ref: 003BA0EC
                                          • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,003C510E,?,?,?,?,?,003C4BB3,?), ref: 003BA12E
                                          • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,003BCE98,00000001,?,?), ref: 003BA158
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FileWrite$Handle
                                          • String ID:
                                          • API String ID: 4209713984-0
                                          • Opcode ID: 713d6cbadc3e401b75ae91f9ebf8aca3ee5caf379262acc31d78edb93aa93a4f
                                          • Instruction ID: ac02670bc4dfecdba051caae8f032f0902ae35eb87d1c30be27171e4c242bbfc
                                          • Opcode Fuzzy Hash: 713d6cbadc3e401b75ae91f9ebf8aca3ee5caf379262acc31d78edb93aa93a4f
                                          • Instruction Fuzzy Hash: 5A312630208B05DBDB229F18DC48BAABBA8EB40718F04455DFA419B9C1CB75DD48CBB3
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA421
                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA454
                                          • GetLastError.KERNEL32(?,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA471
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$ErrorLast
                                          • String ID:
                                          • API String ID: 2485089472-0
                                          • Opcode ID: 21625aa6b658f8eb4e9ca5a0e88b90a2e29dfe6dfd12f6b4e7f8fa030d55945e
                                          • Instruction ID: 44f5ea85048b54db04853ee3fb91bdfc60cdff9f22be5b04c1c9214c761c9c26
                                          • Opcode Fuzzy Hash: 21625aa6b658f8eb4e9ca5a0e88b90a2e29dfe6dfd12f6b4e7f8fa030d55945e
                                          • Instruction Fuzzy Hash: DD01D831110E6465DB33AF7A5C4DBEE735CAF06749F048445FB41DAA91CBE0CD8186A3
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 003DB328
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Info
                                          • String ID:
                                          • API String ID: 1807457897-3916222277
                                          • Opcode ID: a106b2909527fd0dd7778165a906fe087c173dca40379727c3397cc012818aab
                                          • Instruction ID: 97f84133e143c315112de9852185055b9fa32565f40e27814c7e4983092cbc83
                                          • Opcode Fuzzy Hash: a106b2909527fd0dd7778165a906fe087c173dca40379727c3397cc012818aab
                                          • Instruction Fuzzy Hash: 1541297590428CDBDB23CE259C84AFAFBBDEB05304F1504EEE58A86243D3359A45DF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,8FE85006,00000001,?,000000FF), ref: 003DAAAD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: String
                                          • String ID: LCMapStringEx
                                          • API String ID: 2568140703-3893581201
                                          • Opcode ID: 2e75b8fce414398aad9a60d5cb3f01aca7a8adc8470f9383ab5fc53a38b35e95
                                          • Instruction ID: 992cfcee9ba882904cac5d965bc98f5e6cd160462f294d08904778147e56dc17
                                          • Opcode Fuzzy Hash: 2e75b8fce414398aad9a60d5cb3f01aca7a8adc8470f9383ab5fc53a38b35e95
                                          • Instruction Fuzzy Hash: 9E01483654425DBBCF139FA4EE05DEE7F6AEF08750F044255FE082A2A0C6368931EB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,003DA03F), ref: 003DAA25
                                          Strings
                                          • InitializeCriticalSectionEx, xrefs: 003DA9F5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CountCriticalInitializeSectionSpin
                                          • String ID: InitializeCriticalSectionEx
                                          • API String ID: 2593887523-3084827643
                                          • Opcode ID: 63868e83c6402dd88154b3fcb5f34da543b39e72c8fd256645fa9c0f533c54b1
                                          • Instruction ID: 317189a30559fe93e89cab602b028b07113f98eae6decfff1907a36d803d9eca
                                          • Opcode Fuzzy Hash: 63868e83c6402dd88154b3fcb5f34da543b39e72c8fd256645fa9c0f533c54b1
                                          • Instruction Fuzzy Hash: 3EF0903564526CFBCB13AF65DD05DEE7F65EB44760F404255FD056E2A0CA314E20EB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Alloc
                                          • String ID: FlsAlloc
                                          • API String ID: 2773662609-671089009
                                          • Opcode ID: d21e5b2508ff2948905e7f41803204d8bdacb8df23e9a8b186663f0e795fbfc2
                                          • Instruction ID: 4ee356fdcd16789ff31febcad55845cce8c220c62bcceab3e0fd3fe51730935a
                                          • Opcode Fuzzy Hash: d21e5b2508ff2948905e7f41803204d8bdacb8df23e9a8b186663f0e795fbfc2
                                          • Instruction Fuzzy Hash: 12E05531A856ACBB82236B65AD06DEEBB98CB15B10F40025AFC055F3C0CD301E01A7C6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • try_get_function.LIBVCRUNTIME ref: 003D357C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: try_get_function
                                          • String ID: FlsAlloc
                                          • API String ID: 2742660187-671089009
                                          • Opcode ID: cccebad1e4cc5ee52cb86fa26d66c88c407a66704028ef87bdd66ef133724b5a
                                          • Instruction ID: ae08b8dd92a3c7bac1aa117ac3443d5e7df11453ac47dcb4f4e3fe945654b14b
                                          • Opcode Fuzzy Hash: cccebad1e4cc5ee52cb86fa26d66c88c407a66704028ef87bdd66ef133724b5a
                                          • Instruction Fuzzy Hash: 54D05B627817B46BD51332967C06AED7A448702FB6F860366FF0C5E2C195954E1043D6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003DB22B: GetOEMCP.KERNEL32(00000000,?,?,003DB4B4,?), ref: 003DB256
                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,003DB4F9,?,00000000), ref: 003DB6D4
                                          • GetCPInfo.KERNEL32(00000000,003DB4F9,?,?,?,003DB4F9,?,00000000), ref: 003DB6E7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CodeInfoPageValid
                                          • String ID:
                                          • API String ID: 546120528-0
                                          • Opcode ID: 0603f0b3c971929156356ee7fbb4eff2aded6229de1c04c3c475bfc18f570c53
                                          • Instruction ID: 26354763273adb980146b92f564e1147c8a5d158427b515ffc06930bc4f39010
                                          • Opcode Fuzzy Hash: 0603f0b3c971929156356ee7fbb4eff2aded6229de1c04c3c475bfc18f570c53
                                          • Instruction Fuzzy Hash: 4E515276900245DFDB239F31E8806BAFBE9EF81300F16406FD0968B391D7359A02CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B13A7
                                            • Part of subcall function 003B5FD7: __EH_prolog.LIBCMT ref: 003B5FDC
                                            • Part of subcall function 003BCA2B: __EH_prolog.LIBCMT ref: 003BCA30
                                            • Part of subcall function 003BCA2B: new.LIBCMT ref: 003BCA73
                                            • Part of subcall function 003BCA2B: new.LIBCMT ref: 003BCA97
                                          • new.LIBCMT ref: 003B1420
                                            • Part of subcall function 003BB26D: __EH_prolog.LIBCMT ref: 003BB272
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 9a64066ea80dd144bb16b893bef89fa6a5c9d7358d1913bc3505b6355c8d5077
                                          • Instruction ID: 78c849298a656f0da7d8f9b6d0c4de72763a1b68bcb694038b9de95220175fb3
                                          • Opcode Fuzzy Hash: 9a64066ea80dd144bb16b893bef89fa6a5c9d7358d1913bc3505b6355c8d5077
                                          • Instruction Fuzzy Hash: 134167B0805B40DED721CF798485AE6FBE5FF19304F90492ED6EE87282DB326554CB11
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B13A7
                                            • Part of subcall function 003B5FD7: __EH_prolog.LIBCMT ref: 003B5FDC
                                            • Part of subcall function 003BCA2B: __EH_prolog.LIBCMT ref: 003BCA30
                                            • Part of subcall function 003BCA2B: new.LIBCMT ref: 003BCA73
                                            • Part of subcall function 003BCA2B: new.LIBCMT ref: 003BCA97
                                          • new.LIBCMT ref: 003B1420
                                            • Part of subcall function 003BB26D: __EH_prolog.LIBCMT ref: 003BB272
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 89389f3b4433000df790b0ee3ffa75824536a8de318b15e2d664d488cd4571c6
                                          • Instruction ID: 92561c325710ac095fedbaabf239eba272f7b520dbb4c9151d6342f4f7ed870a
                                          • Opcode Fuzzy Hash: 89389f3b4433000df790b0ee3ffa75824536a8de318b15e2d664d488cd4571c6
                                          • Instruction Fuzzy Hash: 4F4166B0805B408EE721CF798485AE6FBE5FF19304F904A2ED2EE87282DB326554CB11
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,003BA07C,?,?,003B7936), ref: 003B9946
                                          • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,003BA07C,?,?,003B7936), ref: 003B997B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: 6be92d548508f0afdfae59b9fcf91c1f6fa222b55c450fb14333065556e27ebf
                                          • Instruction ID: 11341e91af095668ec53ac45f220b0e3468d81f2474cca79db684904bfe00ee4
                                          • Opcode Fuzzy Hash: 6be92d548508f0afdfae59b9fcf91c1f6fa222b55c450fb14333065556e27ebf
                                          • Instruction Fuzzy Hash: F021E471404748AED7318F14C885BE7B7ECEB49768F014A2EF7E5865D1C374AC489B61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,003B75F1,?,?,?,?), ref: 003B9F1C
                                          • SetFileTime.KERNELBASE(?,?,?,?), ref: 003B9FCC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: File$BuffersFlushTime
                                          • String ID:
                                          • API String ID: 1392018926-0
                                          • Opcode ID: d9fff14bc44422f16c7d5ceeef85274c79a52227e8a4e0f92b106babed8b61c6
                                          • Instruction ID: 43717a496e3f2a7b3a542334d140c8eac4dbae7e0a596df3febd3cfdcef494e7
                                          • Opcode Fuzzy Hash: d9fff14bc44422f16c7d5ceeef85274c79a52227e8a4e0f92b106babed8b61c6
                                          • Instruction Fuzzy Hash: 0821D2311582869BC716CF24C881BFABBE8AB95319F05091EB6D1C7991C329EE0CCB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,003B9CD5,?,?,00000000,?,?,003B8F2A,?), ref: 003B9D60
                                          • GetLastError.KERNEL32 ref: 003B9D6D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer
                                          • String ID:
                                          • API String ID: 2976181284-0
                                          • Opcode ID: 716f71fe54611b1962e3e5017b45729c608cb99de3a495d746431a48a658f4f2
                                          • Instruction ID: d79a35237b58e8cb4a4241c312fcbf2aece81365cbc324e402e0f2bcefee1739
                                          • Opcode Fuzzy Hash: 716f71fe54611b1962e3e5017b45729c608cb99de3a495d746431a48a658f4f2
                                          • Instruction Fuzzy Hash: 2901E531304201DBCB1ACE279C847EAB359AFC5725B11462FEB138BA91CA349C058A20
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 003BA016
                                          • GetLastError.KERNEL32 ref: 003BA022
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer
                                          • String ID:
                                          • API String ID: 2976181284-0
                                          • Opcode ID: da099d755fa62d9c0fa650829c24d4acc108e0a25c8f6acfc390dd8eb85a86fc
                                          • Instruction ID: 8e03c8246842fde4c34e55cae60a20cc4c2f2658cf8872fa17c42b881707d3b9
                                          • Opcode Fuzzy Hash: da099d755fa62d9c0fa650829c24d4acc108e0a25c8f6acfc390dd8eb85a86fc
                                          • Instruction Fuzzy Hash: D4019271300A045BDB36AA29DC887B7B7D9AB84319F15893DB246C7A80DA79DD0C8612
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 003D8947
                                            • Part of subcall function 003D8838: RtlAllocateHeap.NTDLL(00000000,?,?,?,003D3CF6,?,0000015D,?,?,?,?,003D51D2,000000FF,00000000,?,?), ref: 003D886A
                                          • RtlReAllocateHeap.NTDLL(00000000,?,?,?,?,003F0F50,003BD11F,?,?,?,?,?,?), ref: 003D8983
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AllocateHeap$_free
                                          • String ID:
                                          • API String ID: 1482568997-0
                                          • Opcode ID: 1be49b9d38cafbc45521bf2d843ee9b9a3feedb782129950c7ecda56e7cd1795
                                          • Instruction ID: 32fcaf1eb8e1ed47aa07b3027fc6e80008260cd2bcba582bb849b9fe804acd4d
                                          • Opcode Fuzzy Hash: 1be49b9d38cafbc45521bf2d843ee9b9a3feedb782129950c7ecda56e7cd1795
                                          • Instruction Fuzzy Hash: 8CF0C223202105BADB232B26BC11F7A3B1CDF817B0F264127F994AA390DF30F80095A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetCurrentProcess.KERNEL32(?,?), ref: 003C0BF0
                                          • GetProcessAffinityMask.KERNEL32(00000000), ref: 003C0BF7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Process$AffinityCurrentMask
                                          • String ID:
                                          • API String ID: 1231390398-0
                                          • Opcode ID: 17d3f7abd260f61310f55d3028878206a6e1dfb8a57cf57dd1cdb156a0415082
                                          • Instruction ID: 155e5196264a401fc8ad1b0b3be7d3fd11f7b4de1be415baa05e835b86b1a388
                                          • Opcode Fuzzy Hash: 17d3f7abd260f61310f55d3028878206a6e1dfb8a57cf57dd1cdb156a0415082
                                          • Instruction Fuzzy Hash: 07E09272A1019AE74F1E86A4DD49EEB739DDA04304B21837DE903DB600F935DE4247A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,003BA46D,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA64B
                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,003BA46D,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA67C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AttributesFile
                                          • String ID:
                                          • API String ID: 3188754299-0
                                          • Opcode ID: f14852d6c9e06becd9f73473ff80c724188cb3d5b73ad26609d68f807d8a46be
                                          • Instruction ID: b1a4d3fc4fce58b78e756910ee4ccd5f234818e4af4ebfa69fb3c4d3f5385beb
                                          • Opcode Fuzzy Hash: f14852d6c9e06becd9f73473ff80c724188cb3d5b73ad26609d68f807d8a46be
                                          • Instruction Fuzzy Hash: E5F0A0712501897BDF129F60DC44FE9776CAF04385F088155BD88CA160DB728EA8AB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemText_swprintf
                                          • String ID:
                                          • API String ID: 3011073432-0
                                          • Opcode ID: c1a0de5c97e72c43da876c219cfcee41f7b9b03ce0dbd3e5eb92c28f74e12cf6
                                          • Instruction ID: 90daa48beac60825ce5008576c77e219c8f411699d3ddb118b544ac67c477d9d
                                          • Opcode Fuzzy Hash: c1a0de5c97e72c43da876c219cfcee41f7b9b03ce0dbd3e5eb92c28f74e12cf6
                                          • Instruction Fuzzy Hash: F9F0EC7151034C7AD713BB619C06FEA3B1CA704345F0404A9B701DF0A3D9756D308761
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DeleteFileW.KERNELBASE(?,?,?,003B99EC,?,?,003B9825,?,?,?,?,003E1F81,000000FF), ref: 003BA331
                                          • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,003B99EC,?,?,003B9825,?,?,?,?,003E1F81,000000FF), ref: 003BA35F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 2c3ce77d9cb9be1aa786f7a4be6df7ab000010a024d4afda8c6a235ca3d6c472
                                          • Instruction ID: 36cab805ffcdc5b74ea28b44c81c749bf1a0b7baf5aad4ccebba473c3c8b26f3
                                          • Opcode Fuzzy Hash: 2c3ce77d9cb9be1aa786f7a4be6df7ab000010a024d4afda8c6a235ca3d6c472
                                          • Instruction Fuzzy Hash: BFE022355442086BDB129FA0DC44FE973ACBB08382F480065BD88CB091DB618D98AB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GdiplusShutdown.GDIPLUS(?,?,?,?,003E1F81,000000FF), ref: 003CA662
                                          • OleUninitialize.OLE32(?,?,?,?,003E1F81,000000FF), ref: 003CA667
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: GdiplusShutdownUninitialize
                                          • String ID:
                                          • API String ID: 3856339756-0
                                          • Opcode ID: 88bff5ce098184acfee83a95c4bf7c8ee337f7693c05d89ae7086b8af59f1545
                                          • Instruction ID: 485c75d939780969e6de1dda6730c61d6eca23f2ad671f3cff09552ede322b9c
                                          • Opcode Fuzzy Hash: 88bff5ce098184acfee83a95c4bf7c8ee337f7693c05d89ae7086b8af59f1545
                                          • Instruction Fuzzy Hash: 04F01572648694EBC6169B49DD45B59FBA8FB89B20F00436AF419836A0CB746811CA90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetFileAttributesW.KERNELBASE(?,?,?,003BA37C,?,003B7776,?,?,?,?), ref: 003BA398
                                          • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,003BA37C,?,003B7776,?,?,?,?), ref: 003BA3C4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AttributesFile
                                          • String ID:
                                          • API String ID: 3188754299-0
                                          • Opcode ID: 6e8c98d3f757b4bf465a9393e470ef043bdfc6e966dd9eb4fdad5e01a419ec70
                                          • Instruction ID: 7e350a5567fd6cf55898c5ac7e2a53bae9c76e1fb312de5119082420fe1d15a6
                                          • Opcode Fuzzy Hash: 6e8c98d3f757b4bf465a9393e470ef043bdfc6e966dd9eb4fdad5e01a419ec70
                                          • Instruction Fuzzy Hash: 0EE09B355005686BCB62AB64DC04BD9B79C9B083E5F044261FE48D71D1D7709D548BD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003C037B
                                          • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003BEE61,Crypt32.dll,00000000,003BEEE5,?,?,003BEEC7,?,?,?), ref: 003C039D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: DirectoryLibraryLoadSystem
                                          • String ID:
                                          • API String ID: 1175261203-0
                                          • Opcode ID: 2a0708c6203a0d85a8be0ef0c46207328c4b083eafff15942b86e6c8dd83a6ae
                                          • Instruction ID: b0f3f16bef2026306bc79ac6e3a11db7ebdd84892263cf6e2d33e78083157069
                                          • Opcode Fuzzy Hash: 2a0708c6203a0d85a8be0ef0c46207328c4b083eafff15942b86e6c8dd83a6ae
                                          • Instruction Fuzzy Hash: D9E0127691116C6BDB229A94EC48FDA776CEF08392F0400A5B949D7144DA749E548BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 003C9D90
                                          • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 003C9D97
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: BitmapCreateFromGdipStream
                                          • String ID:
                                          • API String ID: 1918208029-0
                                          • Opcode ID: 860fa9ba71b14236a6fa10abbfc0da0e068fb7da24ef5593404393c3c27fce0c
                                          • Instruction ID: 322caf8b546992a73e93887e28900b9de63c4c125ea568285fc3031d845409dc
                                          • Opcode Fuzzy Hash: 860fa9ba71b14236a6fa10abbfc0da0e068fb7da24ef5593404393c3c27fce0c
                                          • Instruction Fuzzy Hash: CDE06D75800258EBCB21EF99D908BADB7FCEB08710F11805FE849D3200D6B06E009B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003D3567: try_get_function.LIBVCRUNTIME ref: 003D357C
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003D241A
                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 003D2425
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                          • String ID:
                                          • API String ID: 806969131-0
                                          • Opcode ID: 980b95ba2b690d8381f9f684bdd6b07246024ffa806e4bd8f574dccac3d31924
                                          • Instruction ID: c2fdaebf7987c2df05d1de2b7c7c903d97e529edc284acb4ad0906247a51a6db
                                          • Opcode Fuzzy Hash: 980b95ba2b690d8381f9f684bdd6b07246024ffa806e4bd8f574dccac3d31924
                                          • Instruction Fuzzy Hash: B6D0A727504241541D1727777C024CB23641C727747620657FE108E7D1FA14C5496026
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DloadLock.DELAYIMP ref: 003CDF3A
                                          • DloadProtectSection.DELAYIMP ref: 003CDF56
                                            • Part of subcall function 003CE12F: DloadObtainSection.DELAYIMP ref: 003CE13F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Dload$Section$LockObtainProtect
                                          • String ID:
                                          • API String ID: 731663317-0
                                          • Opcode ID: 156ebbba87bd35cf97c8cd3a192f7b7f18d9ce0926d3c022de1cb42a8a39d4e7
                                          • Instruction ID: 2270875bd2a9064273870c2f57ef62928e3a4d0dc0de627c1f345cbd46af36f1
                                          • Opcode Fuzzy Hash: 156ebbba87bd35cf97c8cd3a192f7b7f18d9ce0926d3c022de1cb42a8a39d4e7
                                          • Instruction Fuzzy Hash: DED012706043448AC21BEB54DC46F982BA4B305344F64063DF607DA1E4EFF45DD1CB99
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemShowWindow
                                          • String ID:
                                          • API String ID: 3351165006-0
                                          • Opcode ID: 71e44ebc996bfc1e08963a9731567e2c9df94bb5e4787dc4b0f7594830ff6690
                                          • Instruction ID: a9484e7aa0052ca14802d8c47148eff3e2add374d87e1cb6b12707222e58d066
                                          • Opcode Fuzzy Hash: 71e44ebc996bfc1e08963a9731567e2c9df94bb5e4787dc4b0f7594830ff6690
                                          • Instruction Fuzzy Hash: 8BC01232498200BECB018BB0DE09C6FBBA9EBA5212F00C928B2A5C0060C2B8C920DB11
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: e09f0fb86f74119c3a1e844d922c3e662012e27b95854c18cbbb70bef741af4e
                                          • Instruction ID: b7a907d64afbe6bacef751f0ad6875016ffc51a2d30a23ae21ff5c6a27af15d1
                                          • Opcode Fuzzy Hash: e09f0fb86f74119c3a1e844d922c3e662012e27b95854c18cbbb70bef741af4e
                                          • Instruction Fuzzy Hash: 25C1D730A042849FDF16CF68C4A8BF97BA5EF06308F4944B9DE46DF686CB349944CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 298b8d1f1b29056e9c8fde4922e3029f24609f14c7d45a09ec073a32a8fd69c3
                                          • Instruction ID: 215fcbacd8b88f15c810b31331308e2e470531c4ae8e57552069715d2908c84b
                                          • Opcode Fuzzy Hash: 298b8d1f1b29056e9c8fde4922e3029f24609f14c7d45a09ec073a32a8fd69c3
                                          • Instruction Fuzzy Hash: 2571D471104F949EDB26DB74CC42AEBF7E8AF14309F44495EE2AB8B542DB316A48CF11
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B8512
                                            • Part of subcall function 003B13A2: __EH_prolog.LIBCMT ref: 003B13A7
                                            • Part of subcall function 003B13A2: new.LIBCMT ref: 003B1420
                                            • Part of subcall function 003B19C6: __EH_prolog.LIBCMT ref: 003B19CB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 52d383af53f93b7dbbb934e1b29c0f2d5cfd69d46f73398e124f55eb0426eb60
                                          • Instruction ID: dd990677525d35bf2d6072eea73ecaf95a72032149da458b929cf40245aeeebd
                                          • Opcode Fuzzy Hash: 52d383af53f93b7dbbb934e1b29c0f2d5cfd69d46f73398e124f55eb0426eb60
                                          • Instruction Fuzzy Hash: 7541D2718406989ADB26EB60CC51BFAB3AC9F10308F0504EAE64A97843DF745FC8DF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 89d9adf03a66ef88e3441d8ddd2dc740461130344a1c70c3b49c2108765f67da
                                          • Instruction ID: c1eb120eeabfd6926af6f5fce1dc2939cd950c42a94908262b088840c5a6e990
                                          • Opcode Fuzzy Hash: 89d9adf03a66ef88e3441d8ddd2dc740461130344a1c70c3b49c2108765f67da
                                          • Instruction Fuzzy Hash: 262128B1E402116FDB15AF79DC41B6B7668FB05314F04413EE915EB681D7709E00C7A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B1E25
                                            • Part of subcall function 003B3AC2: __EH_prolog.LIBCMT ref: 003B3AC7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 26c70541cea668ce756d6d33efdba6e9cf2073ece69fe5794a0c225066e4736d
                                          • Instruction ID: 3ee1d5d9449ff033fd12779bc1efbc10268dd2cada5967f50d13467a917e447b
                                          • Opcode Fuzzy Hash: 26c70541cea668ce756d6d33efdba6e9cf2073ece69fe5794a0c225066e4736d
                                          • Instruction Fuzzy Hash: C2216D71A002089FCB16DF99D9619EEFBF6FF49304F50016EE945AB651CB325E10DB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003CAA58
                                            • Part of subcall function 003B13A2: __EH_prolog.LIBCMT ref: 003B13A7
                                            • Part of subcall function 003B13A2: new.LIBCMT ref: 003B1420
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 17a93bdd18b39a2e61ccec64514435385e89be7192d6c349bcda052be2ba162e
                                          • Instruction ID: 1d58c96351a1dfc00c94b6b9e083febf35ae6d5c2983f5cbfcec786d009547e3
                                          • Opcode Fuzzy Hash: 17a93bdd18b39a2e61ccec64514435385e89be7192d6c349bcda052be2ba162e
                                          • Instruction Fuzzy Hash: 7A215E75C0429D9ECF16DF94C991AEEB7F4BF19308F4044AEE809AB202D7356E05DBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 5f4e68755cce60a669f285371cecdc46ef97545f7f26144f06b7380d3ce7c59f
                                          • Instruction ID: 46d6de3ff950e222d72d0b9fbb9a7e7b9a56ebd37daa3410b23faa2fa9c39ca8
                                          • Opcode Fuzzy Hash: 5f4e68755cce60a669f285371cecdc46ef97545f7f26144f06b7380d3ce7c59f
                                          • Instruction Fuzzy Hash: ED118273A114289BCF23EF99CC51AEEB735EF48754F014156FB15AB651DA34CD0187A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,003D3CF6,?,0000015D,?,?,?,?,003D51D2,000000FF,00000000,?,?), ref: 003D886A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: f288b9ec27696e7980b6ffb290fe7df530bf4dac087971d6224aea72b3a9bae5
                                          • Instruction ID: 078ea363ce1acadfcd1c3cc89f60051f4d35d5c7623a34e6f9827ad0bf7f3467
                                          • Opcode Fuzzy Hash: f288b9ec27696e7980b6ffb290fe7df530bf4dac087971d6224aea72b3a9bae5
                                          • Instruction Fuzzy Hash: 6CE0E5336012219BD7332B66BC05B5A7A5C9B013A0F568223AC05AA391CF10FC0065E1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B5B5C
                                            • Part of subcall function 003BB26D: __EH_prolog.LIBCMT ref: 003BB272
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog
                                          • String ID:
                                          • API String ID: 3519838083-0
                                          • Opcode ID: 599acd430ca9ac56e831876d6172db663a0fe031b78612fc9897c8a3350da89c
                                          • Instruction ID: b1550965afd814c5a72e14b82a4642e16aaad0935d886c27538fd327cc1bbf3f
                                          • Opcode Fuzzy Hash: 599acd430ca9ac56e831876d6172db663a0fe031b78612fc9897c8a3350da89c
                                          • Instruction Fuzzy Hash: 3A01D1349056C4DAD70AE7A8C805BEFF7B8DF15304F04818DB85A97282CBB41F08C762
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,003B982C,?,?,?,?,003E1F81,000000FF), ref: 003B988B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 6d0e949ec834f87aa3afa7a872b3b0664cdf096d69ba8c246dd0c7d0398312d9
                                          • Instruction ID: b39bb8bdf0800bb0008f0e2dac0e68fd6b3bfb595b0759cdf33543a23587badc
                                          • Opcode Fuzzy Hash: 6d0e949ec834f87aa3afa7a872b3b0664cdf096d69ba8c246dd0c7d0398312d9
                                          • Instruction Fuzzy Hash: 45F0B430045B045EEB328A24C9497D277D85B13329F055B1EC3F6838E1C365684C8B40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 003BA6E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CloseFind
                                          • String ID:
                                          • API String ID: 1863332320-0
                                          • Opcode ID: da965e38c0b2fbe181e128c85e9b918a98db719f87f188b9a54b269ed00f8976
                                          • Instruction ID: 41323386e2cb525e3f68fe0323ab09e0b786c16fdc78e6d4fbb0139959211294
                                          • Opcode Fuzzy Hash: da965e38c0b2fbe181e128c85e9b918a98db719f87f188b9a54b269ed00f8976
                                          • Instruction Fuzzy Hash: 92F0823500CF80ABCA236BB48845BCBBBE46F15379F048A49F2FE169D2C6B554959723
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetThreadExecutionState.KERNEL32(00000001), ref: 003C098C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ExecutionStateThread
                                          • String ID:
                                          • API String ID: 2211380416-0
                                          • Opcode ID: 9a6df88f9bf433518ac078f69e62c14189119808aa48004129180b49b5b50dd7
                                          • Instruction ID: e5f7f0d45e4e35cc88c8af767d7faa4c0dc35f7054cbe38bffac96f9f44483c7
                                          • Opcode Fuzzy Hash: 9a6df88f9bf433518ac078f69e62c14189119808aa48004129180b49b5b50dd7
                                          • Instruction Fuzzy Hash: C1D0122661129069EA2B3368A88AFFD161A4FC6325F090169B50D9B2D3CB694C46D7A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GdipAlloc.GDIPLUS(00000010), ref: 003C9FE1
                                            • Part of subcall function 003C9D6F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 003C9D90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Gdip$AllocBitmapCreateFromStream
                                          • String ID:
                                          • API String ID: 1915507550-0
                                          • Opcode ID: 1be1482ac2147708aedbcb5cadff49528507359555a760097fab3dd187c3424e
                                          • Instruction ID: c462303cd235fb542220197190ca8b55b2ba082f5ee9b37e1342a871ebe7243d
                                          • Opcode Fuzzy Hash: 1be1482ac2147708aedbcb5cadff49528507359555a760097fab3dd187c3424e
                                          • Instruction Fuzzy Hash: 17D05E3021420D6A9F466A658C06F6A7A98DB00340F01406EFC04C9141EE71CE206351
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetFileType.KERNELBASE(000000FF,003B9A27), ref: 003B9B35
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FileType
                                          • String ID:
                                          • API String ID: 3081899298-0
                                          • Opcode ID: 1bfa5ce3e4352a5c4b0d90b8666253992a8255c71aac26727b1d6a6a2f041cd7
                                          • Instruction ID: b14befbc5b6b204974d90f7dcba066bfa6eab207def36f5bc5eed1e79052ba3a
                                          • Opcode Fuzzy Hash: 1bfa5ce3e4352a5c4b0d90b8666253992a8255c71aac26727b1d6a6a2f041cd7
                                          • Instruction Fuzzy Hash: 69D01230011180D58F73CB346D491D5B7529B8336EF39CBA5D325C54A1C722CD03F501
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 003CD6FC
                                            • Part of subcall function 003CAF04: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003CAF15
                                            • Part of subcall function 003CAF04: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003CAF26
                                            • Part of subcall function 003CAF04: IsDialogMessageW.USER32(0001044A,?), ref: 003CAF3A
                                            • Part of subcall function 003CAF04: TranslateMessage.USER32(?), ref: 003CAF48
                                            • Part of subcall function 003CAF04: DispatchMessageW.USER32(?), ref: 003CAF52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Message$DialogDispatchItemPeekSendTranslate
                                          • String ID:
                                          • API String ID: 897784432-0
                                          • Opcode ID: e33a87e595ce3f8c59b5f097026e3acf5d7e2780626c0abdd0de00e5ec685a1b
                                          • Instruction ID: 337a058bfd97b9d2b1dafc50671284e1da2a98bffbeb4ff6cbbf2cafe9d70beb
                                          • Opcode Fuzzy Hash: e33a87e595ce3f8c59b5f097026e3acf5d7e2780626c0abdd0de00e5ec685a1b
                                          • Instruction Fuzzy Hash: 57D09E71144200AAD6022B51CE06F1A7AA6BB88B09F404558B384780B1CA72AD30EB16
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: f5ef78cc7fe3d1e936f804092b392620fd593b9274cddde35ea6dec74db1d69e
                                          • Instruction ID: 7222788fbbae1fbf53865e5f26c16940037da7a7ede61ab9be749cf28bac757d
                                          • Opcode Fuzzy Hash: f5ef78cc7fe3d1e936f804092b392620fd593b9274cddde35ea6dec74db1d69e
                                          • Instruction Fuzzy Hash: 5FB012962580827C3107B5456D02F77410CC4C1B20330CA2FF400C51C0E5802C460731
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 7275f16b6c10f43bdb63a4069dfdd1d169f2d9982eb8d0095452dc616bf252cd
                                          • Instruction ID: 26f6866d7a6a6071846b8d2f2b142dd08d68133fc8a350596d96be3930da128d
                                          • Opcode Fuzzy Hash: 7275f16b6c10f43bdb63a4069dfdd1d169f2d9982eb8d0095452dc616bf252cd
                                          • Instruction Fuzzy Hash: 1CB0129A2581857C3107B1456D42F7B411CD4C0B20330892FF000C50C0E5C02C410731
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 3b0494e7db1cd4cc98204d3677a6b779b8122fc58d4bff0808c38c74cb74541b
                                          • Instruction ID: ca9f98efb3cf76a259dd0a31d158afe43252a874f26a1322883905eb62256ba4
                                          • Opcode Fuzzy Hash: 3b0494e7db1cd4cc98204d3677a6b779b8122fc58d4bff0808c38c74cb74541b
                                          • Instruction Fuzzy Hash: 67B0129A2982817C310BB1457E42F7B410CC4C0B20330892FF000C50C0E5C02D420631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: f8408da5c88d904193482c8275f3e212c37c22d47c072fda458ee50de5001649
                                          • Instruction ID: 60c29e4b89768b784e02706fab0850b15239a1c7591aa1d6cd1192452cc2cf22
                                          • Opcode Fuzzy Hash: f8408da5c88d904193482c8275f3e212c37c22d47c072fda458ee50de5001649
                                          • Instruction Fuzzy Hash: 7FB0129A6981817C310771416D4AE7B420CC4C0B21330C92FF500D40C0E5C02C450631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: ea089f3649ce197d6f77b7a2f9a4961eb985522812cef424b976fbd580a8ca40
                                          • Instruction ID: fca90c2ff28d179cb50dd2234821d713ac6a89438861a5a9d453617eb8b9f5ef
                                          • Opcode Fuzzy Hash: ea089f3649ce197d6f77b7a2f9a4961eb985522812cef424b976fbd580a8ca40
                                          • Instruction Fuzzy Hash: 3AB012A62984C17C310BB545AE02F77410CC4C0B20330892FF004C50D0E6802D420631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: e794da5035fe42c3866dd0eb75f59b6c4edc1b2a2188b77fa3d953f144fba4e4
                                          • Instruction ID: 5f5d33fadc6330a24a28248f460a5586e058a51d1375996fdeebb2efaf9845f9
                                          • Opcode Fuzzy Hash: e794da5035fe42c3866dd0eb75f59b6c4edc1b2a2188b77fa3d953f144fba4e4
                                          • Instruction Fuzzy Hash: B5B012A62585C17C3147B545AD02F77410CC4C0B203318A2FF404C50D0E6802C814631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 8a2fa4510c53428b47d8347d5f99b86625876dac6970ea1e9b92781ffd15ee97
                                          • Instruction ID: d31dbe0729f8ca693357bffb73376329316e0c9daa29fd2c840aa99f419e0b95
                                          • Opcode Fuzzy Hash: 8a2fa4510c53428b47d8347d5f99b86625876dac6970ea1e9b92781ffd15ee97
                                          • Instruction Fuzzy Hash: 12B012A62584C17C3107B545AD02F77414CC4C0B20330C92FF404C50D0E6802C410731
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: be6c689a16dacaa7345a9ea390ead3d43b1e3de7ad44335f99a44fa86577f611
                                          • Instruction ID: 3a3e3f68d7c418ea7916a8bc5dc3f75fba0ece3320fbef85f3c4c5be284d4424
                                          • Opcode Fuzzy Hash: be6c689a16dacaa7345a9ea390ead3d43b1e3de7ad44335f99a44fa86577f611
                                          • Instruction Fuzzy Hash: 3AB012962580827C3107B1856D02F77410CC4C4B20330CD2FF000C51C0E5802C460631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 0eda0f7defd038612d3f06eafec2f001a001052f6659fbfaa7935ac9646a5a08
                                          • Instruction ID: 74cff63f3f2c9ae8aaa750f81964cb3896cbfc12554d15f8f167095fceebbad0
                                          • Opcode Fuzzy Hash: 0eda0f7defd038612d3f06eafec2f001a001052f6659fbfaa7935ac9646a5a08
                                          • Instruction Fuzzy Hash: 18B012962581C27C3147B1456D02F77410CC4C0B20331CA2FF400C51C0E5802CC60631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: cc6b96ff24e6246688d06797dbcfda246ccd403b448412741e0576aabe052aad
                                          • Instruction ID: 0064267597057c99263486aa04486559045483276a22f1009a7ad75aee0862bf
                                          • Opcode Fuzzy Hash: cc6b96ff24e6246688d06797dbcfda246ccd403b448412741e0576aabe052aad
                                          • Instruction Fuzzy Hash: 7DB012962581817C3147B1456D02F77424CC4C0B203318A2FF400C50C0E5802C810631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 1e8ef8432f8703afdf4b6bd5b829a25c9ada09dc0bb9ee1f2e367d8b92128587
                                          • Instruction ID: 22dfc98e9797e6687556b3ad7307d79dffaedbf0a834f03650ec6f973dea8892
                                          • Opcode Fuzzy Hash: 1e8ef8432f8703afdf4b6bd5b829a25c9ada09dc0bb9ee1f2e367d8b92128587
                                          • Instruction Fuzzy Hash: 93B012962690817C3107B1456E02F77414DC8C0B30330892FF000C50C0E5802C410631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 03d2b2556920723625d36c025819829f51364b8782fa77292c66b00496b04090
                                          • Instruction ID: f7e9739c73c3ee158fedba3981bcd051f8e058e8d3c20bd6c29c4c67ddd4e581
                                          • Opcode Fuzzy Hash: 03d2b2556920723625d36c025819829f51364b8782fa77292c66b00496b04090
                                          • Instruction Fuzzy Hash: 40B0129A29A0817C310BB1456F02F77410DC4C0B30330892FF000C50C0E5802C420631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 1d55d7880bdfccfd8d429f768c990de656c6645530b689bdcc2982fa2f325717
                                          • Instruction ID: fcc36762af45410ee558374c0f7303947297462f9f1bf8192b991a55c67bbfb9
                                          • Opcode Fuzzy Hash: 1d55d7880bdfccfd8d429f768c990de656c6645530b689bdcc2982fa2f325717
                                          • Instruction Fuzzy Hash: DCB012962590817C3107B1466E02F77410DC4C0B30330C92FF400C50C0E5802C410731
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 2ab56715c59cf9f4125ad0d3ae79fd12b12f5e61c33327c0a9d47d06ee929cdc
                                          • Instruction ID: ce37323cc80453b14bdc856cc97789c936df57d8d707e77191a1cdf941602635
                                          • Opcode Fuzzy Hash: 2ab56715c59cf9f4125ad0d3ae79fd12b12f5e61c33327c0a9d47d06ee929cdc
                                          • Instruction Fuzzy Hash: 76B012A62584C17C310BB546AD02F77410CC4C0B20330892FF004C50D0E6802C410631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 58c06c684ce17eb6a4335eb2d9bbb5a2b8bf1c46f7dead669f0eafd36f31e505
                                          • Instruction ID: 849851be350feed8d2a0374886cfa1bba33eae514204659e91c5aaa6ac1afe3f
                                          • Opcode Fuzzy Hash: 58c06c684ce17eb6a4335eb2d9bbb5a2b8bf1c46f7dead669f0eafd36f31e505
                                          • Instruction Fuzzy Hash: 54B012962980817C310BB155AE03F77410CC4C0F20330892FF000D50C1E6902C420631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CE4D3
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: b37a2d74ca1a465db58a37a55dff14e5fbbb72216ab5e39ea69a1b1d147d688d
                                          • Instruction ID: d5cba53e4ad4e47ce04ff8f9507b15f2b60cbe2a4883e02899a0b73352634ed8
                                          • Opcode Fuzzy Hash: b37a2d74ca1a465db58a37a55dff14e5fbbb72216ab5e39ea69a1b1d147d688d
                                          • Instruction Fuzzy Hash: 18B0129635A111FC320F61523F02EB7011CC4C0B60330CE1FF200D808096802C420132
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 3e687a92b263d6369e7bd52758eb6cf5b5ae304d7d2e9c6b81e30a28487a2542
                                          • Instruction ID: 982a5e38e262fa6439b1953ddc3dbc692ae1238e86def0c7ac9382bd243d3965
                                          • Opcode Fuzzy Hash: 3e687a92b263d6369e7bd52758eb6cf5b5ae304d7d2e9c6b81e30a28487a2542
                                          • Instruction Fuzzy Hash: 4BB012D66580026C3107B2466D06F7F010CC4C8B20330DF2FF101C4080D5842C460231
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: fc273828c20e7a6d5f8f02255ad2cbec793c763f18ad3fcca8ef0cda30e11f0e
                                          • Instruction ID: da1aea343542be1837df93ec55be5d7dd040f7c22bd948ecfdf0a553dfbe930c
                                          • Opcode Fuzzy Hash: fc273828c20e7a6d5f8f02255ad2cbec793c763f18ad3fcca8ef0cda30e11f0e
                                          • Instruction Fuzzy Hash: B7B012E6658441AC31077246AD06F7B014CC4C4B20330DB2FF401C4091D5882C410331
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 6defb1d30ce84d004f279b6e3346f7a9a8fff795c3da24ddc0341e4acb5c9278
                                          • Instruction ID: 6de5480ac966e615cbe9fa8d337c1f9d235f8ca652eedec70fac466f8197811f
                                          • Opcode Fuzzy Hash: 6defb1d30ce84d004f279b6e3346f7a9a8fff795c3da24ddc0341e4acb5c9278
                                          • Instruction Fuzzy Hash: D2B012D66981056C7107B2466D46F7B011CD4C4B203309B2FF001D4080D5842C410331
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 23d690c3cebf52c7a840cc66f247aa07f4f2efc438c72ed73c0fd8107b6c5f68
                                          • Instruction ID: d793695fa632dec788d8535fe7c4882d9cc4240c8cf4d626e62d68dda549c6f8
                                          • Opcode Fuzzy Hash: 23d690c3cebf52c7a840cc66f247aa07f4f2efc438c72ed73c0fd8107b6c5f68
                                          • Instruction Fuzzy Hash: 4DB01292399102AD310B61553D07FF7012CC0C4B20330CA2FF501C9080DA802C450335
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 474f5beb0a47bc0396b1df2712736347087969c3be8bf675debb27ae32d135b9
                                          • Instruction ID: b937d373f9d486ce48977ab3d750f412968df009be97dfdcf8d6f27f85a490e1
                                          • Opcode Fuzzy Hash: 474f5beb0a47bc0396b1df2712736347087969c3be8bf675debb27ae32d135b9
                                          • Instruction Fuzzy Hash: 33B012923591116C3107A1653D07FF7011DC0C4B203308A3FF206C8480DA802C450235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: c0eeaeb20612fcebda174cf4b15720507f492972f5c2c50725bd251be50f4941
                                          • Instruction ID: d7dc82f3e38b8235b690488fe7c4b711c4638295b484d21d85e03072422862be
                                          • Opcode Fuzzy Hash: c0eeaeb20612fcebda174cf4b15720507f492972f5c2c50725bd251be50f4941
                                          • Instruction Fuzzy Hash: E3B012923993067D320721513D07EF7011CC0C0B203308B2FF101D8080DA842C850135
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDEFD
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 5eda51af9839cffa3fa212b322d83c4546c015c0ab3cd59180f7577c3e3f5b73
                                          • Instruction ID: a677484c2b52ad924c3a652e1123f8abb326e42b39bc7fe77c0e3e92b72fec9f
                                          • Opcode Fuzzy Hash: 5eda51af9839cffa3fa212b322d83c4546c015c0ab3cd59180f7577c3e3f5b73
                                          • Instruction Fuzzy Hash: A6B012922582067C710BB151BD06EB7012CC0D0B20330CA2FF500DC490AA803C410235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: afc599beaa6d539a1176c9881ce3aaad7ce204345d1d414223ade9f5aff07775
                                          • Instruction ID: 7e070f71a49ad46ae60332fb68645fd832a5f6dfa738fb73b030a41bfba11954
                                          • Opcode Fuzzy Hash: afc599beaa6d539a1176c9881ce3aaad7ce204345d1d414223ade9f5aff07775
                                          • Instruction Fuzzy Hash: 61B012923991426D310B61553E07FF7051CC0C4B20330CA2FF201C8080DA802C420235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDEFD
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 334b18e535914049a30035f1476e107f1e70cd5b5196814c09f65991406002cf
                                          • Instruction ID: 6a3075a37cdea630053e1acfee07082c8dd41b2884aeda1e6411528455e2e4e4
                                          • Opcode Fuzzy Hash: 334b18e535914049a30035f1476e107f1e70cd5b5196814c09f65991406002cf
                                          • Instruction Fuzzy Hash: 8AB012922982057C710FF155BE02FB7013CC0D0B203308B2FF100CC490D6803C420235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDEFD
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 212e193d57857469b5331a129826e475e7a062327fab673b2b248011d9a13823
                                          • Instruction ID: 514055229d47d8e2d13f1bc69a47ce9adf37a058f67461209f3566370c573461
                                          • Opcode Fuzzy Hash: 212e193d57857469b5331a129826e475e7a062327fab673b2b248011d9a13823
                                          • Instruction Fuzzy Hash: 10B0129229820A7E710BF1557D42FB7011CC0D0B20330892FF100CC490D6803C410231
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: a7be347d619fa08c92febb6de936f14df5ba6bfabe5919f4efabc61ecfdd1de3
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: a7be347d619fa08c92febb6de936f14df5ba6bfabe5919f4efabc61ecfdd1de3
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 6d5a6c19c141a88ee4d65525a4703325ae193124281d95ec90d797e2a3c9dead
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: 6d5a6c19c141a88ee4d65525a4703325ae193124281d95ec90d797e2a3c9dead
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: f9cec9b98a0623fbb3cb6ac040b2c68fe803944034cf34955d7819378b362b68
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: f9cec9b98a0623fbb3cb6ac040b2c68fe803944034cf34955d7819378b362b68
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 370acc677563f065d631ade95ef35ff4fd69d8700d00a2ca41e3f4463ffc71ce
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: 370acc677563f065d631ade95ef35ff4fd69d8700d00a2ca41e3f4463ffc71ce
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 9b58a29fbb9ab6c55387a01862b5313e8b8b71944f1229dc6b661570dfaf4ab6
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: 9b58a29fbb9ab6c55387a01862b5313e8b8b71944f1229dc6b661570dfaf4ab6
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: ae2b7075aa26072fe83e54f70ea6603e740ed20ab7ec79a6c6e530ebf19c6a51
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: ae2b7075aa26072fe83e54f70ea6603e740ed20ab7ec79a6c6e530ebf19c6a51
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: e55428566b6778039a5888b7c8af62ea0fb7fe26173af6038fcd2c5e16b2655a
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: e55428566b6778039a5888b7c8af62ea0fb7fe26173af6038fcd2c5e16b2655a
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 3600971c66cb1ebb51460d5b875a2efec2d492bedf7b5ce50b5750c3c5643903
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: 3600971c66cb1ebb51460d5b875a2efec2d492bedf7b5ce50b5750c3c5643903
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 547007b318facb28df77fffda5775310613255abdaf5542945cdaf7237cb8c6c
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: 547007b318facb28df77fffda5775310613255abdaf5542945cdaf7237cb8c6c
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDB60
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 8f4a2a1f3d70c4894e8fe9f3a491c3eaf4b36d5aff38cb69ee2a3256ff4f5a0d
                                          • Instruction ID: 1452f7a1006ebebefe2abad14ba4e3c0434d466bd9d31b77fcc6f7028cffef65
                                          • Opcode Fuzzy Hash: 8f4a2a1f3d70c4894e8fe9f3a491c3eaf4b36d5aff38cb69ee2a3256ff4f5a0d
                                          • Instruction Fuzzy Hash: 80A0019A6A9596BC710B7692AD46E7B821CC8C4B613319E2EF402D94D1A9902C465A31
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: c3e10106801e6bb71381a937aa95f31e1cd093ba5898e0fd006e7581a2fe7673
                                          • Instruction ID: afba6de2b5f2ee9bb367eeccb6f59bdc579fcd6e3c6ffa77ea65bbdd5597913b
                                          • Opcode Fuzzy Hash: c3e10106801e6bb71381a937aa95f31e1cd093ba5898e0fd006e7581a2fe7673
                                          • Instruction Fuzzy Hash: 24A001DAAA95567C750B76A2AD9AE7B421CC8C0B21331AA6FF402E8495A9842C461631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: cd78d74f050c5616d2c8a4e5e272bb1e06f7831060c10b96da5b74dfa66805ee
                                          • Instruction ID: a19e91fc77cb152d42f4112cc287b3e2ddc403e47829035e75fa7ee3420b8385
                                          • Opcode Fuzzy Hash: cd78d74f050c5616d2c8a4e5e272bb1e06f7831060c10b96da5b74dfa66805ee
                                          • Instruction Fuzzy Hash: C8A001DAAA9556BC710B7692AD4AE7B421CC8C4B61331AE6FF402D8495A9842C461631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: f2538d26e9202745ee6bb0fb40d36e10ac32744aa04983c64c9ccc267c9fcc7f
                                          • Instruction ID: a19e91fc77cb152d42f4112cc287b3e2ddc403e47829035e75fa7ee3420b8385
                                          • Opcode Fuzzy Hash: f2538d26e9202745ee6bb0fb40d36e10ac32744aa04983c64c9ccc267c9fcc7f
                                          • Instruction Fuzzy Hash: C8A001DAAA9556BC710B7692AD4AE7B421CC8C4B61331AE6FF402D8495A9842C461631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: b19a111b8bbd8accc6ac2c82b6f9201ec93397ad008604c5002384d1fc3d5306
                                          • Instruction ID: a19e91fc77cb152d42f4112cc287b3e2ddc403e47829035e75fa7ee3420b8385
                                          • Opcode Fuzzy Hash: b19a111b8bbd8accc6ac2c82b6f9201ec93397ad008604c5002384d1fc3d5306
                                          • Instruction Fuzzy Hash: C8A001DAAA9556BC710B7692AD4AE7B421CC8C4B61331AE6FF402D8495A9842C461631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: dd042b0021e61501022f580619e9648e9cebb13055bf82caea2c82e72ee6af0d
                                          • Instruction ID: a19e91fc77cb152d42f4112cc287b3e2ddc403e47829035e75fa7ee3420b8385
                                          • Opcode Fuzzy Hash: dd042b0021e61501022f580619e9648e9cebb13055bf82caea2c82e72ee6af0d
                                          • Instruction Fuzzy Hash: C8A001DAAA9556BC710B7692AD4AE7B421CC8C4B61331AE6FF402D8495A9842C461631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDD79
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 1ac55412e0d154ce215612510664b1300aceb7c5940f8d1e3973561a42588cd4
                                          • Instruction ID: a19e91fc77cb152d42f4112cc287b3e2ddc403e47829035e75fa7ee3420b8385
                                          • Opcode Fuzzy Hash: 1ac55412e0d154ce215612510664b1300aceb7c5940f8d1e3973561a42588cd4
                                          • Instruction Fuzzy Hash: C8A001DAAA9556BC710B7692AD4AE7B421CC8C4B61331AE6FF402D8495A9842C461631
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 716399678cd728adc070a5e4afbec7576564a83f8810837e9ab709a0d1b055d3
                                          • Instruction ID: 73646ab10ebb04f652687bb7a4388241056d639d0dd54788d7048c79f68ef7e8
                                          • Opcode Fuzzy Hash: 716399678cd728adc070a5e4afbec7576564a83f8810837e9ab709a0d1b055d3
                                          • Instruction Fuzzy Hash: BAA001962AA256BC710B62A27D4BEBB422DC4D4B613309E2EF542D8491AA902C461235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 01c3936ac207eb81ac08ae65abb010070880798302830c164a39bc8dfa180a56
                                          • Instruction ID: 73646ab10ebb04f652687bb7a4388241056d639d0dd54788d7048c79f68ef7e8
                                          • Opcode Fuzzy Hash: 01c3936ac207eb81ac08ae65abb010070880798302830c164a39bc8dfa180a56
                                          • Instruction Fuzzy Hash: BAA001962AA256BC710B62A27D4BEBB422DC4D4B613309E2EF542D8491AA902C461235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: d14da2383928c6ab864c8ca1eff0ca2bf064388bd6d4c7f0f81a8d313dedf2ab
                                          • Instruction ID: 73646ab10ebb04f652687bb7a4388241056d639d0dd54788d7048c79f68ef7e8
                                          • Opcode Fuzzy Hash: d14da2383928c6ab864c8ca1eff0ca2bf064388bd6d4c7f0f81a8d313dedf2ab
                                          • Instruction Fuzzy Hash: BAA001962AA256BC710B62A27D4BEBB422DC4D4B613309E2EF542D8491AA902C461235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDE9C
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: d186f2bdd8cf9279dcdff7207fc2ba7b4e3c2ff00156003f55dff77471318f22
                                          • Instruction ID: 73646ab10ebb04f652687bb7a4388241056d639d0dd54788d7048c79f68ef7e8
                                          • Opcode Fuzzy Hash: d186f2bdd8cf9279dcdff7207fc2ba7b4e3c2ff00156003f55dff77471318f22
                                          • Instruction Fuzzy Hash: BAA001962AA256BC710B62A27D4BEBB422DC4D4B613309E2EF542D8491AA902C461235
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDEFD
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: 68c9e0cf4499e08e014dcd7dfa47ad5dd695dea72fb44c28861f2fe031055880
                                          • Instruction ID: 2f4db10641efce604e4cbccc90468e02acfaf8aa75640ea45fe74f221bd427b3
                                          • Opcode Fuzzy Hash: 68c9e0cf4499e08e014dcd7dfa47ad5dd695dea72fb44c28861f2fe031055880
                                          • Instruction Fuzzy Hash: ABA002965592567C710B71517D46E77411CC4D4B613305D1DF501DC49555403C455131
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003CDEFD
                                            • Part of subcall function 003CE221: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003CE29E
                                            • Part of subcall function 003CE221: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003CE2AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                          • String ID:
                                          • API String ID: 1269201914-0
                                          • Opcode ID: ce61d2c16628f2c0cb753c7ea1619e34753e247acd11b8d87af84e48f04fa5d4
                                          • Instruction ID: 2f4db10641efce604e4cbccc90468e02acfaf8aa75640ea45fe74f221bd427b3
                                          • Opcode Fuzzy Hash: ce61d2c16628f2c0cb753c7ea1619e34753e247acd11b8d87af84e48f04fa5d4
                                          • Instruction Fuzzy Hash: ABA002965592567C710B71517D46E77411CC4D4B613305D1DF501DC49555403C455131
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003B130B: GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                            • Part of subcall function 003B130B: SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 003CBC01
                                          • EndDialog.USER32(?,00000006), ref: 003CBC14
                                          • GetDlgItem.USER32(?,0000006C), ref: 003CBC30
                                          • SetFocus.USER32(00000000), ref: 003CBC37
                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 003CBC71
                                          • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 003CBCA8
                                          • FindFirstFileW.KERNEL32(?,?), ref: 003CBCBE
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003CBCDC
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003CBCEC
                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 003CBD08
                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 003CBD24
                                          • _swprintf.LIBCMT ref: 003CBD54
                                            • Part of subcall function 003B3F8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B3FA2
                                          • SetDlgItemTextW.USER32(?,0000006A,?), ref: 003CBD67
                                          • FindClose.KERNEL32(00000000), ref: 003CBD6E
                                          • _swprintf.LIBCMT ref: 003CBDC7
                                          • SetDlgItemTextW.USER32(?,00000068,?), ref: 003CBDDA
                                          • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 003CBDF7
                                          • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 003CBE17
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003CBE27
                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 003CBE41
                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 003CBE59
                                          • _swprintf.LIBCMT ref: 003CBE85
                                          • SetDlgItemTextW.USER32(?,0000006B,?), ref: 003CBE98
                                          • _swprintf.LIBCMT ref: 003CBEEC
                                          • SetDlgItemTextW.USER32(?,00000069,?), ref: 003CBEFF
                                            • Part of subcall function 003CA8CC: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 003CA8F2
                                            • Part of subcall function 003CA8CC: GetNumberFormatW.KERNEL32(00000400,00000000,?,003EE600,?,?), ref: 003CA941
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                          • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                          • API String ID: 797121971-1840816070
                                          • Opcode ID: fa16ae32d0f9f1aedbf02937ca7e0780a001ba9069a1fa1b8220392c0f686496
                                          • Instruction ID: a38f85df53e248baa025ce50b6474ee1f07ef94d11217c4622fa37439c2f8d75
                                          • Opcode Fuzzy Hash: fa16ae32d0f9f1aedbf02937ca7e0780a001ba9069a1fa1b8220392c0f686496
                                          • Instruction Fuzzy Hash: 07918272548348BFD222DBA0DD89FFBBBACEB49704F04491DF745D6081D771AA058B62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B71EB
                                            • Part of subcall function 003B7CC4: GetCurrentProcess.KERNEL32(00000020,?), ref: 003B7CD3
                                            • Part of subcall function 003B7CC4: GetLastError.KERNEL32 ref: 003B7D19
                                            • Part of subcall function 003B7CC4: CloseHandle.KERNEL32(?), ref: 003B7D28
                                            • Part of subcall function 003BA320: DeleteFileW.KERNELBASE(?,?,?,003B99EC,?,?,003B9825,?,?,?,?,003E1F81,000000FF), ref: 003BA331
                                            • Part of subcall function 003BA320: DeleteFileW.KERNEL32(?,?,?,00000800,?,?,003B99EC,?,?,003B9825,?,?,?,?,003E1F81,000000FF), ref: 003BA35F
                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 003B737E
                                          • CloseHandle.KERNEL32(00000000), ref: 003B739A
                                          • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 003B74C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateDeleteHandle$CurrentErrorH_prologLastProcess
                                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                          • API String ID: 2517273693-3508440684
                                          • Opcode ID: 47e3f6073065d2fdc3797e5a3a3dd30d498333a9587f9bf29db0f15853a08f16
                                          • Instruction ID: 6e2b07d2dc1173b0d68fc07381ed6a7dd2f48d80ceeec6dcff7770f7180c28e7
                                          • Opcode Fuzzy Hash: 47e3f6073065d2fdc3797e5a3a3dd30d498333a9587f9bf29db0f15853a08f16
                                          • Instruction Fuzzy Hash: 1FC12571904648AADB23DB64DC85FEE77B8EF44308F00455AF65AEB682D730AE44CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: H_prolog_memcmp
                                          • String ID: CMT$h%u$hc%u
                                          • API String ID: 3004599000-3282847064
                                          • Opcode ID: 582b58a5e84081ed49703f483560fda7d5799aec6c96aa508ffbed360bbcd623
                                          • Instruction ID: b21c45e01a4be43c84374557c9b0150861907e3af7a1892c4f1259d2e67fba54
                                          • Opcode Fuzzy Hash: 582b58a5e84081ed49703f483560fda7d5799aec6c96aa508ffbed360bbcd623
                                          • Instruction Fuzzy Hash: 8D32E5715102949FDF16DF74C886AEA37A5AF55308F05047EFE8ACF682DB709A48CB21
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                          • API String ID: 4168288129-2761157908
                                          • Opcode ID: b20bbfee6659f52fb94d9dfa84ffd99b30a58e59460391d59d0c1c79cbeb4a6f
                                          • Instruction ID: fe7627456ba9802b85d8083a34e01e0f41a005726e5ccf3119ea80973b67e94f
                                          • Opcode Fuzzy Hash: b20bbfee6659f52fb94d9dfa84ffd99b30a58e59460391d59d0c1c79cbeb4a6f
                                          • Instruction Fuzzy Hash: F5C20A72E086288FDB26DE28ED407E9B7B9EB45305F1545EBD44DEB240E774AE818F40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B2776
                                          • _strlen.LIBCMT ref: 003B2D04
                                            • Part of subcall function 003C1692: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,003BB842,00000000,?,?,?,0001044A), ref: 003C16AE
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003B2E65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                          • String ID: CMT
                                          • API String ID: 1706572503-2756464174
                                          • Opcode ID: 98879140427ca7904e79ac52132e4febe5dd8b2b2f383f41c7e79cac427c6c07
                                          • Instruction ID: 7421c2e4e5c1901d0aec866153a2909266d68da4bd99809d3e3c4dc6d2c60913
                                          • Opcode Fuzzy Hash: 98879140427ca7904e79ac52132e4febe5dd8b2b2f383f41c7e79cac427c6c07
                                          • Instruction Fuzzy Hash: A362E6715102448FDF2ADF78C8856EA3BE5AF54308F05467EEE9ACFA82DB709944CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 003D8A87
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 003D8A91
                                          • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 003D8A9E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 2722cb6c16e88ae1a8cd40a284cd7fdaa1c00d96a72d17e5476c1c909de39b7b
                                          • Instruction ID: bd64336548b9473c6106fa26d19a8b0686b5293fd41e8807eea1006c90ad62f1
                                          • Opcode Fuzzy Hash: 2722cb6c16e88ae1a8cd40a284cd7fdaa1c00d96a72d17e5476c1c909de39b7b
                                          • Instruction Fuzzy Hash: 2931A97591121C9BCB22DF68DC89B9DB7B8BF08310F5141EAE41CAB250EB709F858F45
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .
                                          • API String ID: 0-248832578
                                          • Opcode ID: 88b42baf9fbff26dd692e991a4e45aa1a8b7c77ce6edfd7a7be1cadd287f8f56
                                          • Instruction ID: 819e63f3d9886f7fc684d2eccb9123628d0fccdda13ec3443bab8b39dff5f7c9
                                          • Opcode Fuzzy Hash: 88b42baf9fbff26dd692e991a4e45aa1a8b7c77ce6edfd7a7be1cadd287f8f56
                                          • Instruction Fuzzy Hash: 3931F2B28002496FCB269F78DD84EFA7BBDDB85304F1502AAF459C7391E6309E44CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4c71cb9696925a17b0f1ed029d90042ab8403ec90c4966a08425d5b2b74d4a4
                                          • Instruction ID: d348b54210e8cbe3429922a844a31166ecd7be2f5dfb9a4b6dd68d9b046580c0
                                          • Opcode Fuzzy Hash: e4c71cb9696925a17b0f1ed029d90042ab8403ec90c4966a08425d5b2b74d4a4
                                          • Instruction Fuzzy Hash: BF022C72E002199BDF15CFA9D8806ADF7F5FF88314F25826AD819EB344D731AA45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 003CA8F2
                                          • GetNumberFormatW.KERNEL32(00000400,00000000,?,003EE600,?,?), ref: 003CA941
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FormatInfoLocaleNumber
                                          • String ID:
                                          • API String ID: 2169056816-0
                                          • Opcode ID: 7467a518d39cc8b0b328ee811091a4fe657686d241d3e75ab8906c45f335375f
                                          • Instruction ID: 84c0d196df4e188b34929128c56c4b9c54378791b2f92e17e1c7430e0a2f7fdd
                                          • Opcode Fuzzy Hash: 7467a518d39cc8b0b328ee811091a4fe657686d241d3e75ab8906c45f335375f
                                          • Instruction Fuzzy Hash: 23017136100258BFEB219F65DC49FAB77BCEF19714F004926FA08EB190D3719A24CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(003B7016,00000000,00000400), ref: 003B6EA8
                                          • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 003B6EC9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorFormatLastMessage
                                          • String ID:
                                          • API String ID: 3479602957-0
                                          • Opcode ID: d314ab0fe9b58181393e51034cdd1a1a9c394be62f9f47655adc10ca6a5ad7e3
                                          • Instruction ID: 4ef601fb64a3c556e3ea732cc35421697cc994fa752093fc9eb3ddafbd32b421
                                          • Opcode Fuzzy Hash: d314ab0fe9b58181393e51034cdd1a1a9c394be62f9f47655adc10ca6a5ad7e3
                                          • Instruction Fuzzy Hash: 16D0A7343843017EEE220B30DC0AFB63B586705B42F10CA047353ED4D2C570C4249B14
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,003E145F,?,?,00000008,?,?,003E10FF,00000000), ref: 003E1691
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: e79e0f15b4acd3616a1eacb64806dba7217d0ec7439650a632ec42648979c585
                                          • Instruction ID: 76eb3ec336cabbd3201f132ac07907c1110bc51326f572404944c1eb3f47bbbe
                                          • Opcode Fuzzy Hash: e79e0f15b4acd3616a1eacb64806dba7217d0ec7439650a632ec42648979c585
                                          • Instruction Fuzzy Hash: D6B15C36610658DFD716CF29C48AB657BE0FF45364F2A8658E89ACF2E1C335E981CB40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: gj
                                          • API String ID: 0-4203073231
                                          • Opcode ID: 1f6cdfad7b8610ccbecf6b69e7ac9dac2449bdec5b33284f5e2d380f4fceb7f0
                                          • Instruction ID: 3f317c1149809dd0526c5a3f1467cd27089342ec40cbc30e17e1b7df7b73465c
                                          • Opcode Fuzzy Hash: 1f6cdfad7b8610ccbecf6b69e7ac9dac2449bdec5b33284f5e2d380f4fceb7f0
                                          • Instruction Fuzzy Hash: 14F1D3B1A083818FC348CF29D890A5AFBE1BFCC208F15892EF598D7751E734E9558B56
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetVersionExW.KERNEL32(?), ref: 003BAF0A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Version
                                          • String ID:
                                          • API String ID: 1889659487-0
                                          • Opcode ID: 88dd4475309b4a94b07804133234586c2a57b4179b005e43115cc2f430d94722
                                          • Instruction ID: 3a8b1f468241238874cb69997ee02952f88264b2a457ec352322e267bab58810
                                          • Opcode Fuzzy Hash: 88dd4475309b4a94b07804133234586c2a57b4179b005e43115cc2f430d94722
                                          • Instruction Fuzzy Hash: 1AF030B490470C8FC73ADB18EC856F973B9F798314F200295DA1947795D770AE40CE51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001F310,003CED75), ref: 003CF308
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 9c218b007ce9f7f95108d40bab66fa248a9d5987e5878a1357896c2fe3a5a658
                                          • Instruction ID: 0c4b707fba9055579625de2523aff4b39a4c6bd685a5268bb4408a852963584c
                                          • Opcode Fuzzy Hash: 9c218b007ce9f7f95108d40bab66fa248a9d5987e5878a1357896c2fe3a5a658
                                          • Instruction Fuzzy Hash:
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: HeapProcess
                                          • String ID:
                                          • API String ID: 54951025-0
                                          • Opcode ID: 175f24a769a900bc18b53ee13114a60250c47e25c4cb32e8572a7714f72e71d0
                                          • Instruction ID: 8430dae05ddc47b87dcf0ea2be4315ffdf8677d2300a2a21ff31a1eb456ed2bd
                                          • Opcode Fuzzy Hash: 175f24a769a900bc18b53ee13114a60250c47e25c4cb32e8572a7714f72e71d0
                                          • Instruction Fuzzy Hash: 05A011B02022008B8300CF32AA8C20C3AACAA00280B08C2ACA20ACA2B0EA2080208F00
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47fe8b68d85eb5d17935bfec2f030431fd039ced6a7f16b8f26ca7e07dbe69ab
                                          • Instruction ID: 480ac738c3d23c986fbe0ea2472e53be7262763ea27cd843068aa05d913e3eb0
                                          • Opcode Fuzzy Hash: 47fe8b68d85eb5d17935bfec2f030431fd039ced6a7f16b8f26ca7e07dbe69ab
                                          • Instruction Fuzzy Hash: 99621771604B859FCB2ACF38C891BB9BBE1AF55304F09896DD9AACB742D630ED45C710
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1934457230b8a5889079426b7d709a5a451781bce21afd7ed3a4cdc0267fc13d
                                          • Instruction ID: 956d1ad59129d0b75f8b9fc0c3197bbf30613c25117abaa06f0e8a85ef45e1dd
                                          • Opcode Fuzzy Hash: 1934457230b8a5889079426b7d709a5a451781bce21afd7ed3a4cdc0267fc13d
                                          • Instruction Fuzzy Hash: 9662D07160878A9FC71ACF28C880AA9BBE1BB55304F14866DDDA6CB742D731ED55CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08f5bd359781b5b3123466a5dc6871deb785564998a4d1fc58e8050fbd07c65a
                                          • Instruction ID: c0c59967be09a4c7318b0a43ef6b35395a659f45e681ef884d75f9ce4457c5bb
                                          • Opcode Fuzzy Hash: 08f5bd359781b5b3123466a5dc6871deb785564998a4d1fc58e8050fbd07c65a
                                          • Instruction Fuzzy Hash: 38522AB26047018FC718CF19C891A6AF7E1FFCC304F498A2DE9959B255D734EA19CB86
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff07ba611f8d0b0bef733f3b9c32ed5d809a5b16a743c9bf9bcfe73231da04a2
                                          • Instruction ID: 3bacdeb497b417f07a0e1605167264d351265c1594379516658689e9faeb1d02
                                          • Opcode Fuzzy Hash: ff07ba611f8d0b0bef733f3b9c32ed5d809a5b16a743c9bf9bcfe73231da04a2
                                          • Instruction Fuzzy Hash: 1F12E3B16147068BC72ACF28C991BB9B3E1FF44308F14492EE997CBA81D774AC95CB45
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ff2c213882f8117bec83196f988a67f88769f804bdb7a35505a1e5d704a00db
                                          • Instruction ID: e2ce7c462008ba779fb1594e88401e1d0d09eeec55cfc81d7e696e0216ce4c31
                                          • Opcode Fuzzy Hash: 5ff2c213882f8117bec83196f988a67f88769f804bdb7a35505a1e5d704a00db
                                          • Instruction Fuzzy Hash: D8F1CF71A283018FC726CF29C4805AEBBE1EFC9318F146A2EF5959BB51D330E945CB52
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                          • Instruction ID: 8056f03a7d61e9aeacdd2fd7d7ba670b0e7c69699344efac6b7f25f5c7e73587
                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                          • Instruction Fuzzy Hash: 47C171332150930BEB2E4639A53463FBBA16AD2BB171B075FE4F6CB2D5FE20C5649610
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                          • Instruction ID: 18cfee30dc22fe3c01be3e1b85d358dbbfa29a435db5d6c8501adfee7e246c7e
                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                          • Instruction Fuzzy Hash: 9EC172372051930BEB2E463AA53453FBAA16AD27B131B075ED4F7CB6D5FF20C5249620
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                          • Instruction ID: 6a8004dff21065067b7a8e770e04aff87ed6c332f8026127c4fa78b6912d7ac0
                                          • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                          • Instruction Fuzzy Hash: F7C1B2332151930BEB1E4639A53463FBAA16AE1BB171B076FD4F6CB2D5FF20C5249620
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                          • Instruction ID: f9edd5cc51d7b91c44ec169f0069b9d2b44629db5430c064fd1892fcb44e5a90
                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                          • Instruction Fuzzy Hash: 2CC181332051530AEF2E4639A53463FBAA16AE1BB171B076FD4F6CB2D5FF20D5249610
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8a2b00b2277af7189044cd01592dd97d8d72e34c98b3480da6518cd8a8147f7
                                          • Instruction ID: 839ecea5af5dbba2f56fb577e5380cac1e2e986f1a8ef274b23e478db538d498
                                          • Opcode Fuzzy Hash: d8a2b00b2277af7189044cd01592dd97d8d72e34c98b3480da6518cd8a8147f7
                                          • Instruction Fuzzy Hash: 8EE135745083858FC305CF29D4919BABBF0BB8A300F85495EFAD597352C335EA09DB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2c3de862736fa759ab1a4f332156b41f12bf147e2cfccb8d80ac070fbe34d2d0
                                          • Instruction ID: deed5415dbe23a908e62401c9bb8a207eb7f4ee8ab5c5995770f447346bad551
                                          • Opcode Fuzzy Hash: 2c3de862736fa759ab1a4f332156b41f12bf147e2cfccb8d80ac070fbe34d2d0
                                          • Instruction Fuzzy Hash: 4D915771204B098BDB26EF24D895FFE77D5AB40304F10892DE697CB682EB74AE44D742
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6c6a44f8fc0f5d478d1261d2d466ea67c4aa4956c977a8c80f18a01567553e4
                                          • Instruction ID: b987f0e9d5d6523cdbaea43b5173fbf7f55fa6d1d6546eea48129e124dc36b4b
                                          • Opcode Fuzzy Hash: a6c6a44f8fc0f5d478d1261d2d466ea67c4aa4956c977a8c80f18a01567553e4
                                          • Instruction Fuzzy Hash: 09615773610B09B7DE379A28B892BBE239AEF41700F56091BE883DF792D631DD418355
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7143b401136632ee41cc728dc3e906afaa0c283aea16f65d0c64829696432638
                                          • Instruction ID: 1d3dd0f32e099a1138498bcb4d47d380268eba441547e26f7dc1e9955abd11cc
                                          • Opcode Fuzzy Hash: 7143b401136632ee41cc728dc3e906afaa0c283aea16f65d0c64829696432638
                                          • Instruction Fuzzy Hash: BA7159713447455BEB26DE28C8E1FAD77D4ABA0308F05492DEAC6CB682DB348DC5C752
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                          • Instruction ID: a0861ecdc30e12ac3e8d902f849fe716363ba56a91d1d8e3ac437beed787ca67
                                          • Opcode Fuzzy Hash: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                          • Instruction Fuzzy Hash: 67519B23684B4457DF3B8A78B6597BF63DD9B22300F19051BE8C2CB782D634DE45835A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5cf5501b6edff6c4944f549400d280b7bb0b0fae04c0f70a17d3b96065bac328
                                          • Instruction ID: 9462848c7becb0634a6949225f21dadcd1626346948147d15291709d97a28552
                                          • Opcode Fuzzy Hash: 5cf5501b6edff6c4944f549400d280b7bb0b0fae04c0f70a17d3b96065bac328
                                          • Instruction Fuzzy Hash: E581709121A2E49ECB074F7D38A52F63EA95733301F1904AAD5CA876A3C276465CD721
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0a9d7513e2c8051b6f7a6c01118a53e8fe445f983149a7a095f483d9c836765
                                          • Instruction ID: 95767a41cd17ea7f50b459d0f87d183e448e07e39ea0943039cd584323a89a49
                                          • Opcode Fuzzy Hash: c0a9d7513e2c8051b6f7a6c01118a53e8fe445f983149a7a095f483d9c836765
                                          • Instruction Fuzzy Hash: 4451B03150C3D64EC713CF2891944EFBFE1AE9A318F4A499EE5E54B642C330D64ACB92
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a0bbb8977f7190af7eb3e38762f2b3500f867a40d7731872a187e6df1f3501e
                                          • Instruction ID: 88dce3dcd86cb9ea04fd00fd6e390b3a9a7ea0d4cf4996513ece358b0eee2449
                                          • Opcode Fuzzy Hash: 0a0bbb8977f7190af7eb3e38762f2b3500f867a40d7731872a187e6df1f3501e
                                          • Instruction Fuzzy Hash: 66512771A083058FC748CF19D89059AF7E1FF88314F054A2EE899A7741DB34E959CBD6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52abad45f79ce36a7b19b15fd8adf95ea09ff33d00a420e695b3def5234c655d
                                          • Instruction ID: 699e982dfce1a830965e5feb1fe6dfa3381ade079c9d95a1d45465ec48bc8285
                                          • Opcode Fuzzy Hash: 52abad45f79ce36a7b19b15fd8adf95ea09ff33d00a420e695b3def5234c655d
                                          • Instruction Fuzzy Hash: BF314672604B494FCB15DF28C851AAABBD0FB91304F11892DE9C5C7B42D734EE19CB92
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07605ab272220faeec32fdca315bdb2ddf9e134c13798e015ea6120a673f5149
                                          • Instruction ID: feb6d5e5aa5139f5dca854c3ca5c3baddfaf82c6132f92868f17de0a8d22e716
                                          • Opcode Fuzzy Hash: 07605ab272220faeec32fdca315bdb2ddf9e134c13798e015ea6120a673f5149
                                          • Instruction Fuzzy Hash: D9210771A201618FCB6ACF2DDCD04767755A78A311B47822BEA42CF7D1C534E924CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003CC08A
                                            • Part of subcall function 003CACC6: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 003CAD8E
                                          • SetWindowTextW.USER32(?,?), ref: 003CC3B7
                                          • _wcsrchr.LIBVCRUNTIME ref: 003CC541
                                          • GetDlgItem.USER32(?,00000066), ref: 003CC57C
                                          • SetWindowTextW.USER32(00000000,?), ref: 003CC58C
                                          • SendMessageW.USER32(00000000,00000143,00000000,003FA472), ref: 003CC59A
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 003CC5C5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                          • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                          • API String ID: 3564274579-312220925
                                          • Opcode ID: 37bba23b74698b63678e9431b85685ec519bff6adb3aa738a4063cf03c7aaba9
                                          • Instruction ID: f5bdde8b7312b29e8d8622728febd2f9f945fb4334952235a9527c95d1138440
                                          • Opcode Fuzzy Hash: 37bba23b74698b63678e9431b85685ec519bff6adb3aa738a4063cf03c7aaba9
                                          • Instruction Fuzzy Hash: A6E18376D14518AADF27DBA0EC49EEE777CEF04311F0445AAF609E7190EA70AE84CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _swprintf.LIBCMT ref: 003BDD99
                                            • Part of subcall function 003B3F8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B3FA2
                                            • Part of subcall function 003C18AE: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,003F0EE8,?,003BD4C2,00000000,?,00000050,003F0EE8), ref: 003C18CB
                                          • _strlen.LIBCMT ref: 003BDDBA
                                          • SetDlgItemTextW.USER32(?,003EE154,?), ref: 003BDE1A
                                          • GetWindowRect.USER32(?,?), ref: 003BDE54
                                          • GetClientRect.USER32(?,?), ref: 003BDE60
                                          • GetWindowLongW.USER32(?,000000F0), ref: 003BDF00
                                          • GetWindowRect.USER32(?,?), ref: 003BDF2D
                                          • SetWindowTextW.USER32(?,?), ref: 003BDF70
                                          • GetSystemMetrics.USER32(00000008), ref: 003BDF78
                                          • GetWindow.USER32(?,00000005), ref: 003BDF83
                                          • GetWindowRect.USER32(00000000,?), ref: 003BDFB0
                                          • GetWindow.USER32(00000000,00000002), ref: 003BE022
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                          • String ID: $%s:$CAPTION$T>$d
                                          • API String ID: 2407758923-3895373452
                                          • Opcode ID: b0a3c232202c80b0e40ac33282de9faa942bbc6a7206424a6cd41555b19e216b
                                          • Instruction ID: e03b5e845a135bb746d0a47790c0f09178bda1cfe67e37355a6641e356433cc5
                                          • Opcode Fuzzy Hash: b0a3c232202c80b0e40ac33282de9faa942bbc6a7206424a6cd41555b19e216b
                                          • Instruction Fuzzy Hash: AA81D372608341AFD715DF68CD84BAFBBE9EB89708F04492DFA84D7290D770E9058B52
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 003DC5D6
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC18E
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC1A0
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC1B2
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC1C4
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC1D6
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC1E8
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC1FA
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC20C
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC21E
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC230
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC242
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC254
                                            • Part of subcall function 003DC171: _free.LIBCMT ref: 003DC266
                                          • _free.LIBCMT ref: 003DC5CB
                                            • Part of subcall function 003D87FE: RtlFreeHeap.NTDLL(00000000,00000000,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?), ref: 003D8814
                                            • Part of subcall function 003D87FE: GetLastError.KERNEL32(?,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?,?), ref: 003D8826
                                          • _free.LIBCMT ref: 003DC5ED
                                          • _free.LIBCMT ref: 003DC602
                                          • _free.LIBCMT ref: 003DC60D
                                          • _free.LIBCMT ref: 003DC62F
                                          • _free.LIBCMT ref: 003DC642
                                          • _free.LIBCMT ref: 003DC650
                                          • _free.LIBCMT ref: 003DC65B
                                          • _free.LIBCMT ref: 003DC693
                                          • _free.LIBCMT ref: 003DC69A
                                          • _free.LIBCMT ref: 003DC6B7
                                          • _free.LIBCMT ref: 003DC6CF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID: P>
                                          • API String ID: 161543041-774184395
                                          • Opcode ID: d61f96bb44f8e5e4242409e6b3550d518ade23dd09cb123986df2e72a02c4705
                                          • Instruction ID: 24f69d203ae3dbeae34942d1ce1271e8882d6b96b6fcdf0ea137d9c51c95e8d7
                                          • Opcode Fuzzy Hash: d61f96bb44f8e5e4242409e6b3550d518ade23dd09cb123986df2e72a02c4705
                                          • Instruction Fuzzy Hash: 67311C73620206AEDB229B3AF985B5673E9FF00750F25642BE458DB291DE31FC40CA24
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetWindow.USER32(?,00000005), ref: 003CD011
                                          • GetClassNameW.USER32(00000000,?,00000800), ref: 003CD03D
                                            • Part of subcall function 003C1AC4: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003BB250,?,?,?,003BB1FE,?,-00000002,?,00000000,?), ref: 003C1ADA
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 003CD059
                                          • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 003CD070
                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 003CD084
                                          • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 003CD0AD
                                          • DeleteObject.GDI32(00000000), ref: 003CD0B4
                                          • GetWindow.USER32(00000000,00000002), ref: 003CD0BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                          • String ID: STATIC
                                          • API String ID: 3820355801-1882779555
                                          • Opcode ID: ad1f6edc51db4eed51df20601bef8a0461bf71e5d4889ebc7518a03c7dd5f587
                                          • Instruction ID: 822ae3a17016183a940d7670c65ad93d54eb1d7c2377ff50256d2bc2d3e5bc6f
                                          • Opcode Fuzzy Hash: ad1f6edc51db4eed51df20601bef8a0461bf71e5d4889ebc7518a03c7dd5f587
                                          • Instruction Fuzzy Hash: EB1103321457207BE232AB74DD4AFEF369DAF54711F028139FA41E90D2CBA48D1687A9
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 003D91D5
                                            • Part of subcall function 003D87FE: RtlFreeHeap.NTDLL(00000000,00000000,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?), ref: 003D8814
                                            • Part of subcall function 003D87FE: GetLastError.KERNEL32(?,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?,?), ref: 003D8826
                                          • _free.LIBCMT ref: 003D91E1
                                          • _free.LIBCMT ref: 003D91EC
                                          • _free.LIBCMT ref: 003D91F7
                                          • _free.LIBCMT ref: 003D9202
                                          • _free.LIBCMT ref: 003D920D
                                          • _free.LIBCMT ref: 003D9218
                                          • _free.LIBCMT ref: 003D9223
                                          • _free.LIBCMT ref: 003D922E
                                          • _free.LIBCMT ref: 003D923C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: ac1541f6e7021543f32119333a847488e67729bdb22a2b22d5f2c0f52f107f69
                                          • Instruction ID: b2c2cbc6d1d0b89f0db90e6df29fe5beb3c687f2dec8edcc3d8e5a7d92b685b5
                                          • Opcode Fuzzy Hash: ac1541f6e7021543f32119333a847488e67729bdb22a2b22d5f2c0f52f107f69
                                          • Instruction Fuzzy Hash: 7611867B500148BFCB12EF59E942DD93BA5FF04350F6141A6BA188F276DA31EE50DB84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ;%u$x%u$xc%u
                                          • API String ID: 0-2277559157
                                          • Opcode ID: 1ad17d95d36c09afe9d6ca159447b1f695fdfed2ed57ca98b817e903e575f21b
                                          • Instruction ID: 026b588adc132c3a1d37251eea70d8e6499ec72040155ae3cef02ca2d8a48444
                                          • Opcode Fuzzy Hash: 1ad17d95d36c09afe9d6ca159447b1f695fdfed2ed57ca98b817e903e575f21b
                                          • Instruction Fuzzy Hash: 3BF14D71A043445BDB27EF248895BFF77D96F91308F080669FB89CFA83DA648944C762
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003B130B: GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                            • Part of subcall function 003B130B: SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          • EndDialog.USER32(?,00000001), ref: 003CAFB0
                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 003CAFD7
                                          • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 003CAFF0
                                          • SetWindowTextW.USER32(?,?), ref: 003CB001
                                          • GetDlgItem.USER32(?,00000065), ref: 003CB00A
                                          • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 003CB01E
                                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 003CB034
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: MessageSend$Item$TextWindow$Dialog
                                          • String ID: LICENSEDLG
                                          • API String ID: 3214253823-2177901306
                                          • Opcode ID: 0bd93faacfdd5ed050a74cde3c8beb1a652520a263c8ed3eb1e167b3f8936cbe
                                          • Instruction ID: 9097a253d54e1111e92b083950af47c60366bd05353dee8a30dcba534af57367
                                          • Opcode Fuzzy Hash: 0bd93faacfdd5ed050a74cde3c8beb1a652520a263c8ed3eb1e167b3f8936cbe
                                          • Instruction Fuzzy Hash: 0F2185712442147BE2225F21EE49FBB7E7DEB4AB45F01442CF705E51A0CBA25D11D73A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B95E5
                                          • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 003B9608
                                          • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 003B9627
                                            • Part of subcall function 003C1AC4: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003BB250,?,?,?,003BB1FE,?,-00000002,?,00000000,?), ref: 003C1ADA
                                          • _swprintf.LIBCMT ref: 003B96C3
                                            • Part of subcall function 003B3F8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B3FA2
                                          • MoveFileW.KERNEL32(?,?), ref: 003B9732
                                          • MoveFileW.KERNEL32(?,?), ref: 003B9772
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                          • String ID: rtmp%d
                                          • API String ID: 2111052971-3303766350
                                          • Opcode ID: 0e43b8de52b095293f68ee45366f1c31c69f634046fd1dc95db74e96fdc83ddc
                                          • Instruction ID: 9c4d3040e22ed1933e50a0764662390fd35e68ea6f3435cd42802d569761661c
                                          • Opcode Fuzzy Hash: 0e43b8de52b095293f68ee45366f1c31c69f634046fd1dc95db74e96fdc83ddc
                                          • Instruction Fuzzy Hash: 68415175910158AADF22EF60CC85FDE73BCAF41388F1444A6B749E7442DB759B88CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,003F0F50,003D40E4,003F0F50,?,?,003D3B5F,?,?,003F0F50), ref: 003D92B9
                                          • _free.LIBCMT ref: 003D92EC
                                          • _free.LIBCMT ref: 003D9314
                                          • SetLastError.KERNEL32(00000000,?,003F0F50), ref: 003D9321
                                          • SetLastError.KERNEL32(00000000,?,003F0F50), ref: 003D932D
                                          • _abort.LIBCMT ref: 003D9333
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID: X>
                                          • API String ID: 3160817290-508909066
                                          • Opcode ID: a45b051354b5fe227c0806e39db3f5d23dc031fb8b3453be83ed3d279c5f094d
                                          • Instruction ID: 2af1ed4f14c1b4a0e5ddc154fa8639befd463364264b429e64d36f8bffaf9781
                                          • Opcode Fuzzy Hash: a45b051354b5fe227c0806e39db3f5d23dc031fb8b3453be83ed3d279c5f094d
                                          • Instruction Fuzzy Hash: 4CF0A4375006043AC72373397C4AB6A2A5D9BC1760F760A17F51AAF3D1EE248D014555
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __aulldiv.LIBCMT ref: 003C0D6D
                                            • Part of subcall function 003BAEE5: GetVersionExW.KERNEL32(?), ref: 003BAF0A
                                          • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 003C0D90
                                          • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 003C0DA2
                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 003C0DB3
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003C0DC3
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003C0DD3
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003C0E0D
                                          • __aullrem.LIBCMT ref: 003C0E9B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                          • String ID:
                                          • API String ID: 1247370737-0
                                          • Opcode ID: e2a4cfd4ebab5d5a99d101312ad31d5ab5c87012e01e5830b75dbc389eca3702
                                          • Instruction ID: fa4cf46953929982789492203acaa815e203d2a53434ddc4fb5b385d02f90365
                                          • Opcode Fuzzy Hash: e2a4cfd4ebab5d5a99d101312ad31d5ab5c87012e01e5830b75dbc389eca3702
                                          • Instruction Fuzzy Hash: 104118B24083459FC315DF65C884AABB7F8FB88714F004E2EF596D6650E735E948CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,003DF872,00000000,00000000,00000000,00000000,00000000,003D4D0F), ref: 003DF13F
                                          • __fassign.LIBCMT ref: 003DF1BA
                                          • __fassign.LIBCMT ref: 003DF1D5
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 003DF1FB
                                          • WriteFile.KERNEL32(?,00000000,00000000,003DF872,00000000,?,?,?,?,?,?,?,?,?,003DF872,00000000), ref: 003DF21A
                                          • WriteFile.KERNEL32(?,00000000,00000001,003DF872,00000000,?,?,?,?,?,?,?,?,?,003DF872,00000000), ref: 003DF253
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: caf56269c9b0d1f7a41225dc950bed9cbf03c3f160d0798e4a33e01e82b88386
                                          • Instruction ID: b6b7f462f2d4fab30bbdc49c0ad77ead03667d0c58bed923e49284e5d1af0648
                                          • Opcode Fuzzy Hash: caf56269c9b0d1f7a41225dc950bed9cbf03c3f160d0798e4a33e01e82b88386
                                          • Instruction Fuzzy Hash: 9351C4B9A002499FDB11CFA8EC85AEEBBF8EF09310F14456BE556E7391D7709940CB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetTempPathW.KERNEL32(00000800,?), ref: 003CC7D9
                                          • _swprintf.LIBCMT ref: 003CC80D
                                            • Part of subcall function 003B3F8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B3FA2
                                          • SetDlgItemTextW.USER32(?,00000066,003F946A), ref: 003CC82D
                                          • _wcschr.LIBVCRUNTIME ref: 003CC860
                                          • EndDialog.USER32(?,00000001), ref: 003CC941
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                          • String ID: %s%s%u
                                          • API String ID: 2892007947-1360425832
                                          • Opcode ID: b79a577b4d5a8adca02999591f6db9b94650bc261d0428008b0d1e820ced74be
                                          • Instruction ID: 25d06703a9e0d09435d4432f6c2fbd41af9cba2922743cd4b8a17ad249cbb8e1
                                          • Opcode Fuzzy Hash: b79a577b4d5a8adca02999591f6db9b94650bc261d0428008b0d1e820ced74be
                                          • Instruction Fuzzy Hash: BD416275D1065CAADB27DBA0DC85FEA77BCEF18705F0040AAE509EA160E7719EC4CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 003C9178
                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 003C9199
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AllocByteCharGlobalMultiWide
                                          • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                          • API String ID: 3286310052-4209811716
                                          • Opcode ID: e2f5e51b79441098bd6981a74d620659a944ad2869160c44667a409445d92a9a
                                          • Instruction ID: 5939d116eb4bf8b2d09d0f369781044887261098c62deee6620051e0527e618a
                                          • Opcode Fuzzy Hash: e2f5e51b79441098bd6981a74d620659a944ad2869160c44667a409445d92a9a
                                          • Instruction Fuzzy Hash: F03108325043667BD727AB61AC4FFAB7B6C9F45350F05411FF9019A2C1EF649E0883A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ShowWindow.USER32(?,00000000), ref: 003C9891
                                          • GetWindowRect.USER32(?,00000000), ref: 003C98E7
                                          • ShowWindow.USER32(?,00000005,00000000), ref: 003C997E
                                          • SetWindowTextW.USER32(?,00000000), ref: 003C9986
                                          • ShowWindow.USER32(00000000,00000005), ref: 003C999C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Window$Show$RectText
                                          • String ID: RarHtmlClassName
                                          • API String ID: 3937224194-1658105358
                                          • Opcode ID: 0c8fca1a5363833cae59ad9100c868bbbe58590f4c41371ca17cfe7730f104d3
                                          • Instruction ID: 932ae0ad2af82b580c889d29b59176b66fa4a4c3e5509bc10b081ae9d914d769
                                          • Opcode Fuzzy Hash: 0c8fca1a5363833cae59ad9100c868bbbe58590f4c41371ca17cfe7730f104d3
                                          • Instruction Fuzzy Hash: 18418A32004310AFCB129F659D4CF5BBBA8EB4A700F02856EF909EA156DB70DD11CBA6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003DC2D8: _free.LIBCMT ref: 003DC301
                                          • _free.LIBCMT ref: 003DC362
                                            • Part of subcall function 003D87FE: RtlFreeHeap.NTDLL(00000000,00000000,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?), ref: 003D8814
                                            • Part of subcall function 003D87FE: GetLastError.KERNEL32(?,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?,?), ref: 003D8826
                                          • _free.LIBCMT ref: 003DC36D
                                          • _free.LIBCMT ref: 003DC378
                                          • _free.LIBCMT ref: 003DC3CC
                                          • _free.LIBCMT ref: 003DC3D7
                                          • _free.LIBCMT ref: 003DC3E2
                                          • _free.LIBCMT ref: 003DC3ED
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: b4869a11d69ac16d31ffc0356dc65cdab29eeda7956d265d3493ae357e3f0567
                                          • Instruction ID: 5ed7e6cfc08de7bb3184df2b22a57f6c07e37f646a5ab92c7aedfc1084b46ab8
                                          • Opcode Fuzzy Hash: b4869a11d69ac16d31ffc0356dc65cdab29eeda7956d265d3493ae357e3f0567
                                          • Instruction Fuzzy Hash: 761184735A0705B6D922B7B1DC47FCB779D6F10700F440E16B299AE252DE34B50587D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,003D2361,003CFDB2), ref: 003D2378
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 003D2386
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003D239F
                                          • SetLastError.KERNEL32(00000000,?,003D2361,003CFDB2), ref: 003D23F1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 02c870d699820a93785299f4d436e12a24914e681369fe718ec5b2c34972e336
                                          • Instruction ID: b3822d21a6f8f20a668f4482201369a08e496390554f007499ecc6fe3778b366
                                          • Opcode Fuzzy Hash: 02c870d699820a93785299f4d436e12a24914e681369fe718ec5b2c34972e336
                                          • Instruction Fuzzy Hash: F401D4372082116FAB272B747CC56AB2A58EB31374B22072BF1204E3E4EF558C056548
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,003D8C7F,003D891B,?,003D92E3,00000001,00000364,?,003D3B5F,?,?,003F0F50), ref: 003D933E
                                          • _free.LIBCMT ref: 003D9373
                                          • _free.LIBCMT ref: 003D939A
                                          • SetLastError.KERNEL32(00000000,?,003F0F50), ref: 003D93A7
                                          • SetLastError.KERNEL32(00000000,?,003F0F50), ref: 003D93B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID: X>
                                          • API String ID: 3170660625-508909066
                                          • Opcode ID: c6ff1c6248d46c47842cffe10409cbf9b76157c48f71de3b7dac3f6b305dce82
                                          • Instruction ID: cc5d1ea827fbaf32b9b4f69c1d11dbcfca1ca117799e19500dde55336358164a
                                          • Opcode Fuzzy Hash: c6ff1c6248d46c47842cffe10409cbf9b76157c48f71de3b7dac3f6b305dce82
                                          • Instruction Fuzzy Hash: 6D01FF3B604A002B83236735BCC9B6A276EABC13B0B320627F516AB3D1EF35CD015524
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                          • API String ID: 0-1718035505
                                          • Opcode ID: 700d31cbeb021010cb0c2a1c50888e25bb4438ddaa59f366528f2244c51ee346
                                          • Instruction ID: 42fdc93f2c0151d60cc01d39f0700bca708b9322c338a76789101ddad57e2519
                                          • Opcode Fuzzy Hash: 700d31cbeb021010cb0c2a1c50888e25bb4438ddaa59f366528f2244c51ee346
                                          • Instruction Fuzzy Hash: 8C01FF722412625B0F735EB65CD4FE76398BA02356322827EF503D7280EB60CC81ABE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 003D836E
                                            • Part of subcall function 003D87FE: RtlFreeHeap.NTDLL(00000000,00000000,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?), ref: 003D8814
                                            • Part of subcall function 003D87FE: GetLastError.KERNEL32(?,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?,?), ref: 003D8826
                                          • _free.LIBCMT ref: 003D8380
                                          • _free.LIBCMT ref: 003D8393
                                          • _free.LIBCMT ref: 003D83A4
                                          • _free.LIBCMT ref: 003D83B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID: >
                                          • API String ID: 776569668-3623353604
                                          • Opcode ID: 478c8faf6716d76aa7a189a4e6bb14ddd758429acb42bd8af07e55d3016c8817
                                          • Instruction ID: 4d3a8dadda2b906a684a497116a53f6b1e139bc5841bf69cc1fd090fe86ef990
                                          • Opcode Fuzzy Hash: 478c8faf6716d76aa7a189a4e6bb14ddd758429acb42bd8af07e55d3016c8817
                                          • Instruction Fuzzy Hash: 8DF05E7B8011649FCB136F26BC814897BA5F714720B19866BF524AF3B4CF3128519F8D
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003C0FDD
                                            • Part of subcall function 003BAEE5: GetVersionExW.KERNEL32(?), ref: 003BAF0A
                                          • LocalFileTimeToFileTime.KERNEL32(?,003C0F88), ref: 003C1001
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003C1017
                                          • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 003C1026
                                          • SystemTimeToFileTime.KERNEL32(?,003C0F88), ref: 003C1034
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003C1042
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Time$File$System$Local$SpecificVersion
                                          • String ID:
                                          • API String ID: 2092733347-0
                                          • Opcode ID: 3a922015ef00f74dda953773555bd3f457bac57bff70bd9aaf113e52803e6be3
                                          • Instruction ID: 8ebada2c1f6abb59b5ff7e6430b672266c9c28ec1ccb210f138cbe81c5f2b226
                                          • Opcode Fuzzy Hash: 3a922015ef00f74dda953773555bd3f457bac57bff70bd9aaf113e52803e6be3
                                          • Instruction Fuzzy Hash: 5231037A90024AEBCB11DFE5C8859EFBBBCFF58300F04455AE916E7210E7309A85CB65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: 959a799da3f86bbae1d46d5df0b65d55dbd6d717e097f874dacf9a07fe1b3994
                                          • Instruction ID: 5c6378376d0497cc82c6a844dd6382cda013c608b02b5a3ccc54c86ce1afca39
                                          • Opcode Fuzzy Hash: 959a799da3f86bbae1d46d5df0b65d55dbd6d717e097f874dacf9a07fe1b3994
                                          • Instruction Fuzzy Hash: 7021A6B260421EABD70EDE12DC45FAB77AD9B51788F06822AFC48DF241F670DD424790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 003CD5AF
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003CD5C9
                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003CD5DA
                                          • TranslateMessage.USER32(?), ref: 003CD5E4
                                          • DispatchMessageW.USER32(?), ref: 003CD5EE
                                          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 003CD5F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                          • String ID:
                                          • API String ID: 2148572870-0
                                          • Opcode ID: 3ac329b39108655ded6a3fe63409abba5325472b6d751b452a633c7c542518a1
                                          • Instruction ID: dbc0f0ed1a1a5726b9adc5ac850667e0e8e694964182689182e6d91fb1025582
                                          • Opcode Fuzzy Hash: 3ac329b39108655ded6a3fe63409abba5325472b6d751b452a633c7c542518a1
                                          • Instruction Fuzzy Hash: 04F04F32A01119BBCF319BA1ED4CEDBBF6DEF56361F008126F60AD6050D6749911C7A4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,8FE85006,003D4236,00000000,00000000,003D526B,?,kR=,?,00000001,003D4236,8FE85006,00000001,003D526B,003D526B), ref: 003DC445
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 003DC4CE
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 003DC4E0
                                          • __freea.LIBCMT ref: 003DC4E9
                                            • Part of subcall function 003D8838: RtlAllocateHeap.NTDLL(00000000,?,?,?,003D3CF6,?,0000015D,?,?,?,?,003D51D2,000000FF,00000000,?,?), ref: 003D886A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                          • String ID: kR=
                                          • API String ID: 2652629310-1797688852
                                          • Opcode ID: 73671e7fb280e6e1e5f1be3ac01869b785cfd449a08d72e698d9c93086535725
                                          • Instruction ID: c0e59715ee48c505b195a163546be0a7ae0cd579e344e21a014a712586463a05
                                          • Opcode Fuzzy Hash: 73671e7fb280e6e1e5f1be3ac01869b785cfd449a08d72e698d9c93086535725
                                          • Instruction Fuzzy Hash: D631B37292011A9BDF279F65EC55DBE7BB9EB00310F05422AFC14DA250EB35CD50C7A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _wcschr.LIBVCRUNTIME ref: 003CC6C5
                                            • Part of subcall function 003C1AC4: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003BB250,?,?,?,003BB1FE,?,-00000002,?,00000000,?), ref: 003C1ADA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CompareString_wcschr
                                          • String ID: <$HIDE$MAX$MIN
                                          • API String ID: 2548945186-3358265660
                                          • Opcode ID: ff2eec9d7208c4c9a8218ad5e4a267db3df8c0bb98ef09c3c3a013c05fc004c8
                                          • Instruction ID: 8d31d6188455f9d7f239ad3418d890ec11444c2dc9727847e1207d978cdf7653
                                          • Opcode Fuzzy Hash: ff2eec9d7208c4c9a8218ad5e4a267db3df8c0bb98ef09c3c3a013c05fc004c8
                                          • Instruction Fuzzy Hash: DC318E7291025DAEDF23DA54CC85FEE77BCEB14704F0145AAF609E6181EBB1AEC48B50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003B130B: GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                            • Part of subcall function 003B130B: SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          • EndDialog.USER32(?,00000001), ref: 003CAC6E
                                          • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 003CAC86
                                          • SetDlgItemTextW.USER32(?,00000067,?), ref: 003CACB4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemText$DialogWindow
                                          • String ID: GETPASSWORD1$xj@
                                          • API String ID: 445417207-803508282
                                          • Opcode ID: dac17505e54d941444bb668ab83fc021aa4e573c9a9418b2cbeb1c3bbd3dbf5d
                                          • Instruction ID: bef5e4699a2d9bb790f5fb3a922706d65c447672b6126acd301034493c1cddab
                                          • Opcode Fuzzy Hash: dac17505e54d941444bb668ab83fc021aa4e573c9a9418b2cbeb1c3bbd3dbf5d
                                          • Instruction Fuzzy Hash: 7E116B3294011C77DB239A649D49FFB3B7CEB09709F018064FB45F64C0C6A19D5187B2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadBitmapW.USER32(00000065), ref: 003CB08D
                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 003CB0B2
                                          • DeleteObject.GDI32(00000000), ref: 003CB0E4
                                          • DeleteObject.GDI32(00000000), ref: 003CB107
                                            • Part of subcall function 003CA07C: FindResourceW.KERNEL32(003CB0DD,PNG,?,?,?,003CB0DD,00000066), ref: 003CA08E
                                            • Part of subcall function 003CA07C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,003CB0DD,00000066), ref: 003CA0A6
                                            • Part of subcall function 003CA07C: LoadResource.KERNEL32(00000000,?,?,?,003CB0DD,00000066), ref: 003CA0B9
                                            • Part of subcall function 003CA07C: LockResource.KERNEL32(00000000,?,?,?,003CB0DD,00000066), ref: 003CA0C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                          • String ID: ]
                                          • API String ID: 142272564-3352871620
                                          • Opcode ID: 507b784bf4037ebf9afc0ca64008e3cc0dd704b32087ab418660d1a0264d1837
                                          • Instruction ID: 990de26a8298f779a1d7f6a7bd4324634933fec00850c33eee68abcaf1fa697b
                                          • Opcode Fuzzy Hash: 507b784bf4037ebf9afc0ca64008e3cc0dd704b32087ab418660d1a0264d1837
                                          • Instruction Fuzzy Hash: D9012B31540625A7C72267649C0AFBFBA7EAF85742F0A411DFD10EB251CF728C1483A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003B130B: GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                            • Part of subcall function 003B130B: SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          • EndDialog.USER32(?,00000001), ref: 003CCF9B
                                          • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 003CCFB1
                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 003CCFC5
                                          • SetDlgItemTextW.USER32(?,00000068), ref: 003CCFD4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemText$DialogWindow
                                          • String ID: RENAMEDLG
                                          • API String ID: 445417207-3299779563
                                          • Opcode ID: 1bfc2016117923a1e399bf5afdd024235ca711565eeabb06ec79c67666db7d8b
                                          • Instruction ID: f7c4c08076dcc98620d1d07bd2030fd00dc64e133adaa188a5dd5a41bc61daf6
                                          • Opcode Fuzzy Hash: 1bfc2016117923a1e399bf5afdd024235ca711565eeabb06ec79c67666db7d8b
                                          • Instruction Fuzzy Hash: EA0168322983117EE6128F649D08FA7BB5EEB5AB02F01442CF305E24D0C6B25C158738
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,003D7844,?,?,003D77E4,?,003EBAD8,0000000C,003D793B,?,00000002), ref: 003D78B3
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 003D78C6
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,003D7844,?,?,003D77E4,?,003EBAD8,0000000C,003D793B,?,00000002,00000000), ref: 003D78E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: c59d8b45033175817c7cbe10abd0187ed55f7101e9a3942839aaf55a992e1df0
                                          • Instruction ID: 4582a793230e056f008578f6ae8d8492f48d908a3a98073e755732eb95724502
                                          • Opcode Fuzzy Hash: c59d8b45033175817c7cbe10abd0187ed55f7101e9a3942839aaf55a992e1df0
                                          • Instruction Fuzzy Hash: 52F0A43161415CFBCB229B54DC4EBDDBFB8EF04755F000269F805AA290DB304E40DB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003C0360: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003C037B
                                            • Part of subcall function 003C0360: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003BEE61,Crypt32.dll,00000000,003BEEE5,?,?,003BEEC7,?,?,?), ref: 003C039D
                                          • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 003BEE6D
                                          • GetProcAddress.KERNEL32(003F81C0,CryptUnprotectMemory), ref: 003BEE7D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AddressProc$DirectoryLibraryLoadSystem
                                          • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                          • API String ID: 2141747552-1753850145
                                          • Opcode ID: 7f84b039084a21e12d7cdfa4b00241e322655825018a36294d7740b89e0c1048
                                          • Instruction ID: 45756178dac89c7e5470c4b407cc6dca105bb831f85fd0cea7b01dafa8da914a
                                          • Opcode Fuzzy Hash: 7f84b039084a21e12d7cdfa4b00241e322655825018a36294d7740b89e0c1048
                                          • Instruction Fuzzy Hash: 89E04F708007D19EC7735F39980DBC6BAE4AB14704F018A1DF486D76C1D7B4D9408B50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 5e153c75167e960fe5001b648e42540216e606353c5a8d6a5a13ceb22621df9a
                                          • Instruction ID: eb360e6cc18db83dd0d3d39b94a683f6f67e1263fc16c289f9f2fee18b1e3ad6
                                          • Opcode Fuzzy Hash: 5e153c75167e960fe5001b648e42540216e606353c5a8d6a5a13ceb22621df9a
                                          • Instruction Fuzzy Hash: B241D237A002049FCB22DF78E881A59B7B5EF89314F1645AAE515EF391DB31AE05CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 003DB9A9
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003DB9CC
                                            • Part of subcall function 003D8838: RtlAllocateHeap.NTDLL(00000000,?,?,?,003D3CF6,?,0000015D,?,?,?,?,003D51D2,000000FF,00000000,?,?), ref: 003D886A
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 003DB9F2
                                          • _free.LIBCMT ref: 003DBA05
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003DBA14
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: 520ce7a4748c90cc4fe33167933007bb777baa38998abcb92e5f5802c1b689d5
                                          • Instruction ID: 66367f560da356e60ced0f9c627292a462ad458fe084ccf679151b0af18e96c3
                                          • Opcode Fuzzy Hash: 520ce7a4748c90cc4fe33167933007bb777baa38998abcb92e5f5802c1b689d5
                                          • Instruction Fuzzy Hash: 16018873601395BFA32356B67C8DC7BAA6DDEC6BA1B16021AFD04DB344DF608D0191B0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 003DC287
                                            • Part of subcall function 003D87FE: RtlFreeHeap.NTDLL(00000000,00000000,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?), ref: 003D8814
                                            • Part of subcall function 003D87FE: GetLastError.KERNEL32(?,?,003DC306,?,00000000,?,00000000,?,003DC32D,?,00000007,?,?,003DC72A,?,?), ref: 003D8826
                                          • _free.LIBCMT ref: 003DC299
                                          • _free.LIBCMT ref: 003DC2AB
                                          • _free.LIBCMT ref: 003DC2BD
                                          • _free.LIBCMT ref: 003DC2CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: c8b48c075b9f49f9089988398ab70f9593ed5f3e6bcc7fe1bcbd7236ecf91b52
                                          • Instruction ID: 9e4c3ebcd613ac99987a34ec0a666c2bb09aa471e73d1f4eea3ca6309f9fce46
                                          • Opcode Fuzzy Hash: c8b48c075b9f49f9089988398ab70f9593ed5f3e6bcc7fe1bcbd7236ecf91b52
                                          • Instruction Fuzzy Hash: 61F0FF73524245AB8A23DBA9F9C6C5673DDBA00720B651D07F019DF650CE30FC808668
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _swprintf
                                          • String ID: %ls$%s: %s
                                          • API String ID: 589789837-2259941744
                                          • Opcode ID: 6eaa0b703f76126249c0a7b521476e984b606fa5ba84af2dd253a679f85d3665
                                          • Instruction ID: eee5d551c453a765c0888c594a143f9e62cdcae14ab99bc7388d62e062b8095d
                                          • Opcode Fuzzy Hash: 6eaa0b703f76126249c0a7b521476e984b606fa5ba84af2dd253a679f85d3665
                                          • Instruction Fuzzy Hash: C251957A688304FAE6232A94DD42F76769DAB07B04F24490EF3C6E8CE3C5A65C107756
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B763D
                                            • Part of subcall function 003B3AC2: __EH_prolog.LIBCMT ref: 003B3AC7
                                          • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000,00000000), ref: 003B7704
                                            • Part of subcall function 003B7CC4: GetCurrentProcess.KERNEL32(00000020,?), ref: 003B7CD3
                                            • Part of subcall function 003B7CC4: GetLastError.KERNEL32 ref: 003B7D19
                                            • Part of subcall function 003B7CC4: CloseHandle.KERNEL32(?), ref: 003B7D28
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                          • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                          • API String ID: 3813983858-639343689
                                          • Opcode ID: 2ee267d84c5085e09ef4bd135d88922f275b725b2d06d7b478165d2043759066
                                          • Instruction ID: f65edcdc5e513e02e9b9410a7efd1f53955244778b763d023d8e7e84a420b0db
                                          • Opcode Fuzzy Hash: 2ee267d84c5085e09ef4bd135d88922f275b725b2d06d7b478165d2043759066
                                          • Instruction Fuzzy Hash: 5F31C471904248AADF13EB68DC46BFE7BA9EF95318F044059F645EB682CBB04A04CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003B130B: GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                            • Part of subcall function 003B130B: SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          • EndDialog.USER32(?,00000001), ref: 003CA748
                                          • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 003CA75D
                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 003CA772
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemText$DialogWindow
                                          • String ID: ASKNEXTVOL
                                          • API String ID: 445417207-3402441367
                                          • Opcode ID: 49583d7b3d834a1a39168f9c047856c2990137a82cf6cef03c9c407494026bdd
                                          • Instruction ID: f987cc838fa1fdd019643a3ded5a25d35e7927cc56deb8999c1e814a54cb7b34
                                          • Opcode Fuzzy Hash: 49583d7b3d834a1a39168f9c047856c2990137a82cf6cef03c9c407494026bdd
                                          • Instruction Fuzzy Hash: 7C11E632200604BFD6139FA8DD49FA63BBDFB4A749F110118F340DB5B0C7A19C419B6A
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: __fprintf_l_strncpy
                                          • String ID: $%s$@%s
                                          • API String ID: 1857242416-834177443
                                          • Opcode ID: 03cc682fe69752a1fedc83dfaab26aff9fb87bf8af360d7ac78912df2447e713
                                          • Instruction ID: 20997a83b25445dbd807913c900dded7f6c23bac78ad7c8e8be240b9f098af16
                                          • Opcode Fuzzy Hash: 03cc682fe69752a1fedc83dfaab26aff9fb87bf8af360d7ac78912df2447e713
                                          • Instruction Fuzzy Hash: 7F21A172400348AEDF32EEA5DC46FEE3BACAF04304F040522FA149A592E771EA458B61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _swprintf.LIBCMT ref: 003BB70E
                                            • Part of subcall function 003B3F8F: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B3FA2
                                          • _wcschr.LIBVCRUNTIME ref: 003BB72C
                                          • _wcschr.LIBVCRUNTIME ref: 003BB73C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _wcschr$__vswprintf_c_l_swprintf
                                          • String ID: %c:\
                                          • API String ID: 525462905-3142399695
                                          • Opcode ID: 0063a13b2adad49c196d55ac8902add2721480efb3dc87109dce4baf8caca9fd
                                          • Instruction ID: aa7f027e38a97e7e9d869f96e0db5bb350ffff1f288c9bcdf45719aff0573d71
                                          • Opcode Fuzzy Hash: 0063a13b2adad49c196d55ac8902add2721480efb3dc87109dce4baf8caca9fd
                                          • Instruction Fuzzy Hash: 5C014523500311BAC622AB259C83DABE3ACEED5370700841BFA45CB981FF60D850C2B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,003BADB5,00000008,?,00000000,?,003BCD8C,?,00000000), ref: 003C09CE
                                          • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,003BADB5,00000008,?,00000000,?,003BCD8C,?,00000000), ref: 003C09D8
                                          • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,003BADB5,00000008,?,00000000,?,003BCD8C,?,00000000), ref: 003C09E8
                                          Strings
                                          • Thread pool initialization failed., xrefs: 003C0A00
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                                          • String ID: Thread pool initialization failed.
                                          • API String ID: 3340455307-2182114853
                                          • Opcode ID: 79577e5ae8835b7a3d7fd7f3906f021ed41135fee255b491dc2649ceec95f810
                                          • Instruction ID: ca7d18548689c2e86fd4673c781c47c5e31f4ad78c2e084039c67ecd540f836a
                                          • Opcode Fuzzy Hash: 79577e5ae8835b7a3d7fd7f3906f021ed41135fee255b491dc2649ceec95f810
                                          • Instruction Fuzzy Hash: F8119EB1500748AFD3325F66C888AA7FBECEB55714F11482EE2DA87241D6716D80CB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RENAMEDLG$REPLACEFILEDLG
                                          • API String ID: 0-56093855
                                          • Opcode ID: 6c47d31f937a45f25e6039cf2d541acc655f1b5438c3d0f8b5e0a01348781668
                                          • Instruction ID: 85195fba3202960ef9e67d548e3cb70b797312b5b173e9603de70d0b17b26f09
                                          • Opcode Fuzzy Hash: 6c47d31f937a45f25e6039cf2d541acc655f1b5438c3d0f8b5e0a01348781668
                                          • Instruction Fuzzy Hash: 6A01F771A04249AFDB178F59ED04FA67FADE708380F410439F909E3231DAB19C60DBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: __alldvrm$_strrchr
                                          • String ID:
                                          • API String ID: 1036877536-0
                                          • Opcode ID: e530949d133c0fe719df7704e4bd8e68177ea7de6064a97516e7fd75facf1640
                                          • Instruction ID: 6a41b98bedbc34d59a978d8b562dee3dabc02d85361330ea4d4b6b80e89f68fb
                                          • Opcode Fuzzy Hash: e530949d133c0fe719df7704e4bd8e68177ea7de6064a97516e7fd75facf1640
                                          • Instruction Fuzzy Hash: 35A145739142869FEB238F28E891BAEBBE5EF15310F19416FE4959B381D638CD41C750
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,003B823A,?,?,?), ref: 003BA544
                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000000,?,003B823A,?), ref: 003BA588
                                          • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000000,?,003B823A,?,?,?,?,?,?,?), ref: 003BA609
                                          • CloseHandle.KERNEL32(?,?,?,00000000,?,003B823A,?,?,?,?,?,?,?,?,?,?), ref: 003BA610
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: File$Create$CloseHandleTime
                                          • String ID:
                                          • API String ID: 2287278272-0
                                          • Opcode ID: 512451a0b22e3f18a378f7f339e3ebb2a2c84ab51195721db670f5973123609a
                                          • Instruction ID: 8e9e9edeffbd2045784323721aa8534b40cfd92872a7de061b01fc539e58ff2c
                                          • Opcode Fuzzy Hash: 512451a0b22e3f18a378f7f339e3ebb2a2c84ab51195721db670f5973123609a
                                          • Instruction Fuzzy Hash: C741FF30248B81AAE732DE24CC45FEEBBE8AB85304F04091DF6D5D75C0D6A49B489B53
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 003D27BA
                                            • Part of subcall function 003D2DF2: ___AdjustPointer.LIBCMT ref: 003D2E3C
                                          • _UnwindNestedFrames.LIBCMT ref: 003D27D1
                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 003D27E3
                                          • CallCatchBlock.LIBVCRUNTIME ref: 003D2807
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                          • String ID:
                                          • API String ID: 2633735394-0
                                          • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                                          • Instruction ID: 2391318cdde1b230eb3e75000b4bdba13e91580d22f9a7943e01a93a5632f699
                                          • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                                          • Instruction Fuzzy Hash: D401DB32000149BBDF139F65DC41EDB7BBAEF58754F154515F91865221C336E8A1EBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetDC.USER32(00000000), ref: 003CA01E
                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 003CA02D
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003CA03B
                                          • ReleaseDC.USER32(00000000,00000000), ref: 003CA049
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CapsDevice$Release
                                          • String ID:
                                          • API String ID: 1035833867-0
                                          • Opcode ID: 4173d274fe5a902cd0a85aa97f64de0e6b839486c57719a87e3974959b6f4e24
                                          • Instruction ID: 5dd335a5f6896916bef50b96d64e97ec76cd85a55bb6f71aa1550144403aa064
                                          • Opcode Fuzzy Hash: 4173d274fe5a902cd0a85aa97f64de0e6b839486c57719a87e3974959b6f4e24
                                          • Instruction Fuzzy Hash: A7E08C31981A22A7C3225BA16C0DBDB3F18BB0EB12F018225F701D6190DAB04400CBA8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 003D22B6
                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 003D22BB
                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 003D22C0
                                            • Part of subcall function 003D33BE: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 003D33CF
                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 003D22D5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                          • String ID:
                                          • API String ID: 1761009282-0
                                          • Opcode ID: 5bd959aa501a7ab12ea48519a29bdec622f540cb30e6334150180b8a95b84f40
                                          • Instruction ID: 65a303d7fdb5b6438b7a877a0e02859f2dfe9be9aa9ceff443dfdf91bc9fca8b
                                          • Opcode Fuzzy Hash: 5bd959aa501a7ab12ea48519a29bdec622f540cb30e6334150180b8a95b84f40
                                          • Instruction Fuzzy Hash: E2C04C5F108641641DA33AB572071EF43105CB67C47812CC3F8421F707DD164E0A3933
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003CA051: GetDC.USER32(00000000), ref: 003CA055
                                            • Part of subcall function 003CA051: GetDeviceCaps.GDI32(00000000,0000000C), ref: 003CA060
                                            • Part of subcall function 003CA051: ReleaseDC.USER32(00000000,00000000), ref: 003CA06B
                                          • GetObjectW.GDI32(?,00000018,?), ref: 003CA1ED
                                            • Part of subcall function 003CA476: GetDC.USER32(00000000), ref: 003CA47F
                                            • Part of subcall function 003CA476: GetObjectW.GDI32(?,00000018,?), ref: 003CA4AE
                                            • Part of subcall function 003CA476: ReleaseDC.USER32(00000000,?), ref: 003CA546
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ObjectRelease$CapsDevice
                                          • String ID: (
                                          • API String ID: 1061551593-3887548279
                                          • Opcode ID: cf548a8becb6c6646906b589892df7bb0c7e61e2f598c12c5d8e8212a31a6015
                                          • Instruction ID: 51e1613a1ab5a3f8566685935b165b535c1c430d59c1c5bbd25672f478728de1
                                          • Opcode Fuzzy Hash: cf548a8becb6c6646906b589892df7bb0c7e61e2f598c12c5d8e8212a31a6015
                                          • Instruction Fuzzy Hash: 97911371208758AFC715DF69C888E2BBBE8FF88704F00495DF586DB260DA71AD05DB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • _free.LIBCMT ref: 003DAD94
                                            • Part of subcall function 003D8B69: IsProcessorFeaturePresent.KERNEL32(00000017,003D8B58,0000002C,003EBC40,003DBD76,00000000,00000000,003D9338,?,?,003D8B65,00000000,00000000,00000000,00000000,00000000), ref: 003D8B6B
                                            • Part of subcall function 003D8B69: GetCurrentProcess.KERNEL32(C0000417,003EBC40,0000002C,003D8896,00000016,003D9338), ref: 003D8B8D
                                            • Part of subcall function 003D8B69: TerminateProcess.KERNEL32(00000000), ref: 003D8B94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                          • String ID: *?$.
                                          • API String ID: 2667617558-3972193922
                                          • Opcode ID: b6f4886fb241bc6412e8874b3df55810ed09b0cad714297808d292c8a57c0ef0
                                          • Instruction ID: e25a7c3b47774b6f71374097c6e7d5e14b6af0591c245736035f5b4fe173fa1e
                                          • Opcode Fuzzy Hash: b6f4886fb241bc6412e8874b3df55810ed09b0cad714297808d292c8a57c0ef0
                                          • Instruction Fuzzy Hash: 1651B372E00509AFDF16DFA8D981AADB7F5FF58310F25816AE444EB340E6319E01CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __EH_prolog.LIBCMT ref: 003B77FF
                                          • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003B799B
                                            • Part of subcall function 003BA637: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,003BA46D,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA64B
                                            • Part of subcall function 003BA637: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,003BA46D,?,?,?,003BA2B3,?,00000001,00000000,?,?), ref: 003BA67C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: File$Attributes$H_prologTime
                                          • String ID: :
                                          • API String ID: 1861295151-336475711
                                          • Opcode ID: 525b56f9dbe6a3fc053ac37b7de6a87faa420569bade55c6db9aabbf9a10b6eb
                                          • Instruction ID: 3b7c31fd51731848700c87de15cb01afc52426cd422a46b078ef9aaf0e66e8d3
                                          • Opcode Fuzzy Hash: 525b56f9dbe6a3fc053ac37b7de6a87faa420569bade55c6db9aabbf9a10b6eb
                                          • Instruction Fuzzy Hash: 12419271900668AAEB26EB54CD56FEEB37CDF81304F00409AB705E7482DB705F89CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: UNC$\\?\
                                          • API String ID: 0-253988292
                                          • Opcode ID: 9e9a33ebd8584929fe6f5459b965d82de0684ddc83b502c28b7315352e8fb7ed
                                          • Instruction ID: c8e4f4d5a486f631a18bbf64d0cb17456e0718c3b284e1b369f6ced99cd5add3
                                          • Opcode Fuzzy Hash: 9e9a33ebd8584929fe6f5459b965d82de0684ddc83b502c28b7315352e8fb7ed
                                          • Instruction Fuzzy Hash: 8341D035400259BADB23AF22DC42EEEF7ADEF00398B01412AFA5497541EBB0DE54C790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 003C4619
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw
                                          • String ID: HC>$XC>
                                          • API String ID: 2005118841-715119689
                                          • Opcode ID: f38b602638828ee74d7abd6a10666789049cc7e35740726b2e6d91feeeff5c6b
                                          • Instruction ID: ca69edb000c0e79d7ac4c8bae7cb56a0101cd061d8a0aa18032f327466f0b4a1
                                          • Opcode Fuzzy Hash: f38b602638828ee74d7abd6a10666789049cc7e35740726b2e6d91feeeff5c6b
                                          • Instruction Fuzzy Hash: 47416A756007008FD315DF28D891FAAB7E5FF99304F45892DE89ACB351EA72ED188B41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Shell.Explorer$about:blank
                                          • API String ID: 0-874089819
                                          • Opcode ID: 1b1c1e262bb5f747687f41c21d81d68c6ad930dec3785d8e365922cc4ed317bb
                                          • Instruction ID: 1d3ed983d431f9df6dd320654c639268be6c1caa99d05fa7a2933283f46b3938
                                          • Opcode Fuzzy Hash: 1b1c1e262bb5f747687f41c21d81d68c6ad930dec3785d8e365922cc4ed317bb
                                          • Instruction Fuzzy Hash: D5215E71214218AFDB0A9F65C899F6677A8EF48710F16895EE949CF286DA70ED00CB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DialogBoxParamW.USER32(GETPASSWORD1,0001044A,003CAC20,?,?), ref: 003CD782
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: DialogParam
                                          • String ID: GETPASSWORD1$xj@
                                          • API String ID: 665744214-803508282
                                          • Opcode ID: 7519c38070bd6a43fda3d9719244f6869720ec53fe21d20567191699d8054595
                                          • Instruction ID: 771089af342bfd4c8413e35084652bfe44930d43ec4efa03f07b3e4ca2d25eca
                                          • Opcode Fuzzy Hash: 7519c38070bd6a43fda3d9719244f6869720ec53fe21d20567191699d8054595
                                          • Instruction Fuzzy Hash: 321138312102586AEB23EE259C41FFB3798AB0A710F054179FE49EB1C1CBB49C50C794
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003BEE4E: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 003BEE6D
                                            • Part of subcall function 003BEE4E: GetProcAddress.KERNEL32(003F81C0,CryptUnprotectMemory), ref: 003BEE7D
                                          • GetCurrentProcessId.KERNEL32(?,?,?,003BEEC7), ref: 003BEF5F
                                          Strings
                                          • CryptProtectMemory failed, xrefs: 003BEF16
                                          • CryptUnprotectMemory failed, xrefs: 003BEF57
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: AddressProc$CurrentProcess
                                          • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                          • API String ID: 2190909847-396321323
                                          • Opcode ID: 0432d8d0972697989ecd972316188aabe29ed7a8fe0cb2cf8a3d80bd348f9e95
                                          • Instruction ID: 15b35d336b9f130fc75b8a9f5cff45f841a04b931756b915db47bc6e54959192
                                          • Opcode Fuzzy Hash: 0432d8d0972697989ecd972316188aabe29ed7a8fe0cb2cf8a3d80bd348f9e95
                                          • Instruction Fuzzy Hash: 72113831A09228ABDB275B28DC46AFE3759EF00728F064259FE056F692CB359E41C7D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID: X>
                                          • API String ID: 269201875-508909066
                                          • Opcode ID: 98c7b2db8d3e42408c758c412d9742fe92d8ee6d7b3d5e70fd84495d54a00afa
                                          • Instruction ID: ee11d65adea67082c77eec009218d29dbfb54f58710c5b2f4b687bcb40efcf1f
                                          • Opcode Fuzzy Hash: 98c7b2db8d3e42408c758c412d9742fe92d8ee6d7b3d5e70fd84495d54a00afa
                                          • Instruction Fuzzy Hash: 3711BF73A012119AEB229B39BC05B9633D8A710720F154677F629EF3E4E774D8429788
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003CF4FE
                                          • ___raise_securityfailure.LIBCMT ref: 003CF5E5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FeaturePresentProcessor___raise_securityfailure
                                          • String ID: 8A
                                          • API String ID: 3761405300-1632395889
                                          • Opcode ID: b3f8696fa45117bbf32934ce82ca83a11ba8b6ec8263455bb19104827b2d5ed4
                                          • Instruction ID: b9caf9e78230af2edc22f20660dc7f8a55d591568ede1480294e99d52f9d92ca
                                          • Opcode Fuzzy Hash: b3f8696fa45117bbf32934ce82ca83a11ba8b6ec8263455bb19104827b2d5ed4
                                          • Instruction Fuzzy Hash: 4321F0B55103089BD721DF56FA86B903BA5BB09310F20993AE908CB7A1E7F169D0CF49
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003D92B5: GetLastError.KERNEL32(?,003F0F50,003D40E4,003F0F50,?,?,003D3B5F,?,?,003F0F50), ref: 003D92B9
                                            • Part of subcall function 003D92B5: _free.LIBCMT ref: 003D92EC
                                            • Part of subcall function 003D92B5: SetLastError.KERNEL32(00000000,?,003F0F50), ref: 003D932D
                                            • Part of subcall function 003D92B5: _abort.LIBCMT ref: 003D9333
                                          • _abort.LIBCMT ref: 003DB5F0
                                          • _free.LIBCMT ref: 003DB624
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorLast_abort_free
                                          • String ID: >
                                          • API String ID: 289325740-3623353604
                                          • Opcode ID: f86f58a0a09439626f6466ec3ad60b091b8937c9a29178aa9b922316221698c4
                                          • Instruction ID: f26dadf5aaeb74d7344496c0f008b343c56c721b06e085e9f428c4b0974e5ef7
                                          • Opcode Fuzzy Hash: f86f58a0a09439626f6466ec3ad60b091b8937c9a29178aa9b922316221698c4
                                          • Instruction Fuzzy Hash: 61012133D01A65DBC7239F69B84166AF364BB08710F1B060BE4556B785CB74AE418FC5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                            • Part of subcall function 003BDD73: _swprintf.LIBCMT ref: 003BDD99
                                            • Part of subcall function 003BDD73: _strlen.LIBCMT ref: 003BDDBA
                                            • Part of subcall function 003BDD73: SetDlgItemTextW.USER32(?,003EE154,?), ref: 003BDE1A
                                            • Part of subcall function 003BDD73: GetWindowRect.USER32(?,?), ref: 003BDE54
                                            • Part of subcall function 003BDD73: GetClientRect.USER32(?,?), ref: 003BDE60
                                          • GetDlgItem.USER32(00000000,00003021), ref: 003B134F
                                          • SetWindowTextW.USER32(00000000,003E35B4), ref: 003B1365
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                          • String ID: 0
                                          • API String ID: 2622349952-4108050209
                                          • Opcode ID: 4ba25178a1f5cf9d0c77c44447273c912682055c140084cd2d528b1a465334a4
                                          • Instruction ID: 02d923dbe93aebf8614b140a0ae119b4403eb7e6c54891d6917e08ddd867ffdf
                                          • Opcode Fuzzy Hash: 4ba25178a1f5cf9d0c77c44447273c912682055c140084cd2d528b1a465334a4
                                          • Instruction Fuzzy Hash: D2F08C3910034CA6DF274F608929BE93B98AF21349F498024FF8994DA1D7B8C991AE50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF,003C0C48,?,?,003C0CBF,?,?,?,?,?,003C0CA9), ref: 003C0B2F
                                          • GetLastError.KERNEL32(?,?,003C0CBF,?,?,?,?,?,003C0CA9), ref: 003C0B3B
                                            • Part of subcall function 003B6E68: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003B6E86
                                          Strings
                                          • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 003C0B44
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                          • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                          • API String ID: 1091760877-2248577382
                                          • Opcode ID: 35d0e09c56b9adab991e1680b87d9e1778ce9f38a94996301f727906baf6f84e
                                          • Instruction ID: 621da5c00928001620de2d79b6b12958a1107f443d140409bc3d31b5f0daee59
                                          • Opcode Fuzzy Hash: 35d0e09c56b9adab991e1680b87d9e1778ce9f38a94996301f727906baf6f84e
                                          • Instruction Fuzzy Hash: A6D05E7690857066CE172368AC4FEFF79099B51734F240B58F33AAE1E6CA244E4187E6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,003BD5EF,?), ref: 003BDD2E
                                          • FindResourceW.KERNEL32(00000000,RTL,00000005,?,003BD5EF,?), ref: 003BDD3C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1299653647.00000000003B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003B0000, based on PE: true
                                          • Associated: 00000000.00000002.1299466445.00000000003B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1299885494.00000000003E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.00000000003F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300025394.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000418000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1300242046.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3b0000_noway-2D8EB.jbxd
                                          Similarity
                                          • API ID: FindHandleModuleResource
                                          • String ID: RTL
                                          • API String ID: 3537982541-834975271
                                          • Opcode ID: 20b357ce15d1b8c033a0c32661aad8690e784d13fed549da5015d8668322e534
                                          • Instruction ID: e8bb27e9466db7e8b5dd711011f3f5671618349a9b10062c630c7038dcfe6cbc
                                          • Opcode Fuzzy Hash: 20b357ce15d1b8c033a0c32661aad8690e784d13fed549da5015d8668322e534
                                          • Instruction Fuzzy Hash: 21C0123124539076D73217216C4DBD7694C9B51B15F05054CF242DF1D0D6E5D9418650
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8V;$;L_I$<L_I$=L_I$>L_I$X}<$`{<
                                          • API String ID: 0-2894903083
                                          • Opcode ID: 608fbdf922423051d682ff21d6c2736b6cda381a9bee5ae4ecc2edbdaee24eb9
                                          • Instruction ID: 4434738c260bc5652b8c09dafa4fccde548976aef67f49fc5d73d8bd1a524164
                                          • Opcode Fuzzy Hash: 608fbdf922423051d682ff21d6c2736b6cda381a9bee5ae4ecc2edbdaee24eb9
                                          • Instruction Fuzzy Hash: E9F1B59690FBC1CBF75683D818161386FD4AF57210B98A1FBE08D4B19FA81ED90D83D2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: [d?$6d?B$P[d?$X[d?$6d?$Zd?$Zd?
                                          • API String ID: 0-204977980
                                          • Opcode ID: 0b2a319c249ea2ef29a2bb827d66d91d1fe561923bf99de5bcf3c6e42a18ea37
                                          • Instruction ID: ebd99334cb16dbbfc2f22a4b6075ca6d2d7665547103fe408842b93da8088791
                                          • Opcode Fuzzy Hash: 0b2a319c249ea2ef29a2bb827d66d91d1fe561923bf99de5bcf3c6e42a18ea37
                                          • Instruction Fuzzy Hash: 2DE1376150E6C94FE75397B858661F97FE0DF8B220B4855EBD0CD8B5A3D80D681BC382
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: [d?$6d?B$P[d?$X[d?$6d?$Zd?$Zd?
                                          • API String ID: 0-204977980
                                          • Opcode ID: 6e25c470dc173a64e5643529d2dcd739b46695c79674ba005c24e02f29016213
                                          • Instruction ID: 5877d3bc3c7ba3e09df6a55298675ebd6c55b86f1f725e6381213c5867a67044
                                          • Opcode Fuzzy Hash: 6e25c470dc173a64e5643529d2dcd739b46695c79674ba005c24e02f29016213
                                          • Instruction Fuzzy Hash: 8E91F55110EAC91FE312A7F898665FD7FE0DF8B16074856EBD0CA8B5A3D90D1817D382
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: [d?$6d?
                                          • API String ID: 0-3354621211
                                          • Opcode ID: e273cc6568bad778f8234fa77511b70dd344230fcd619ee2c4de6c2e42f461a8
                                          • Instruction ID: 226ee210bab8434d61c2c0525c5f53345763de37fa8e8ea9e2bd8182c781bb01
                                          • Opcode Fuzzy Hash: e273cc6568bad778f8234fa77511b70dd344230fcd619ee2c4de6c2e42f461a8
                                          • Instruction Fuzzy Hash: CF11081150E6C84FE71297F858621EA7FE0DF4B120B5895EFD0C9C7593C84E585B8392
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: {=L_^
                                          • API String ID: 0-193490728
                                          • Opcode ID: 3c39c3adcb133624c51e2f75c12d208f132029ff910c129bd0e609a86e99d61f
                                          • Instruction ID: 60d39895532e8f71a664a8710d64b8983e69b501092a06c5e11dac6358da95e6
                                          • Opcode Fuzzy Hash: 3c39c3adcb133624c51e2f75c12d208f132029ff910c129bd0e609a86e99d61f
                                          • Instruction Fuzzy Hash: 48E04F71418B088BC344DF18E4804DABBE0FF95320F801B6EF05AC71A1DF7595818A82
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8be2fa094794a7d766a8ba74adfb2ed681dcabf3519276583e33f9aa88f561cc
                                          • Instruction ID: 8343e0a031b322a21879f1bd7e1432ee8bd5a879de3d6830b0693c26bfeb6594
                                          • Opcode Fuzzy Hash: 8be2fa094794a7d766a8ba74adfb2ed681dcabf3519276583e33f9aa88f561cc
                                          • Instruction Fuzzy Hash: 0CC12870619A498FEB99EF28C455AF977E1FF59300F1055ADE40EC7292CE39E846C780
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba821d65b1fafd9b2215225928d787ebbf83f3a9c0de918419a915102c802449
                                          • Instruction ID: da6b02f5ddab7e3969e61822d2c79ec3617c7176adc644d9625af320e5a2d78d
                                          • Opcode Fuzzy Hash: ba821d65b1fafd9b2215225928d787ebbf83f3a9c0de918419a915102c802449
                                          • Instruction Fuzzy Hash: 0C51C671A09A0A8FEBA9EF28C494AFA77E1FF95310F145579D40EC3295CE39E845C780
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1db92979f59243e9bdf0117243c0e4d2e224c59123fe22118a4521bd4587ce64
                                          • Instruction ID: cc2cf9c9d970f6106e0dd0af6630e4ab228347e9b86ce4aca84ce0b141e898cb
                                          • Opcode Fuzzy Hash: 1db92979f59243e9bdf0117243c0e4d2e224c59123fe22118a4521bd4587ce64
                                          • Instruction Fuzzy Hash: CA518071908B1C8FDB58DF58D845AEDBBF1FB99310F00826AD44DD7252DA34A885CBC2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 74e4b96213e8728f6eef9d3e5a99c0fff2fb3e579ac2fb26aaba1bd82c78e555
                                          • Instruction ID: cc195fdbce9a256350916ebe574e3450d607e893964d3a5658699a624113302d
                                          • Opcode Fuzzy Hash: 74e4b96213e8728f6eef9d3e5a99c0fff2fb3e579ac2fb26aaba1bd82c78e555
                                          • Instruction Fuzzy Hash: 4421D126D0A95E8AFBA6D7A848112F976E0EF4E311F40B175D41DC20A3DD1EB80E06C1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75c4315c87b1547635e06b800ae619db330ea538a97e48521f02e590843ef2f4
                                          • Instruction ID: d2d166d23f5fb6710b81e41b3810d41a0c136846542fc07e86d1e72d055971a1
                                          • Opcode Fuzzy Hash: 75c4315c87b1547635e06b800ae619db330ea538a97e48521f02e590843ef2f4
                                          • Instruction Fuzzy Hash: 12F0B73160964E8BCF85DF48D8419EAB7A1FF58310B109666E51AC7145DA35E8558BC0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94b7a2c8f25af12fb7866b34a045710494b59cc2a472dd60eb5bef7bbbb2b92f
                                          • Instruction ID: b0eb928bb2a61195350bb55c875697a16c5ee264893b174fb658f3ac7f8b4464
                                          • Opcode Fuzzy Hash: 94b7a2c8f25af12fb7866b34a045710494b59cc2a472dd60eb5bef7bbbb2b92f
                                          • Instruction Fuzzy Hash: EEE0C226F4581E8AFA45F378B816AFDB395EFC9201BC0A831E10EC2083CD1D64150282
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1748878454.00007FFAAC690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC690000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_7ffaac690000_sussy.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f467730d342510bb3ccd0e0c0e2ac8b651fd87a7eb1f11d9e94ff1279afef93f
                                          • Instruction ID: d6528b33ed18dc670ddac7f0570803f4c7d0c8513a5295ff49447260bcf7d35d
                                          • Opcode Fuzzy Hash: f467730d342510bb3ccd0e0c0e2ac8b651fd87a7eb1f11d9e94ff1279afef93f
                                          • Instruction Fuzzy Hash: 04C0123342C64957D381EB10E481CEE7350FF90610F802B39F04A41095DD59A64585C1
                                          Uniqueness

                                          Uniqueness Score: -1.00%